Sciweavers

1084 search results - page 1 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
IJSN
2007
73views more  IJSN 2007»
13 years 4 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
IPCCC
2007
IEEE
13 years 11 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji

Presentation
956views
11 years 10 months ago
A Method for Distributed Computaion of Semi-Optimal Multicast Tree in MANET
In this paper, we propose a new method to construct a semi-optimal QoS-aware multicast tree on MANET using distributed computation of the tree based on Genetic Algorithm (GA). This...
ICASSP
2011
IEEE
12 years 8 months ago
Non-linear noise compensation for robust speech recognition using Gauss-Newton method
In this paper, we present the Gauss-Newton method as a unified approach to optimizing non-linear noise compensation models, such as vector Taylor series (VTS), data-driven parall...
Yong Zhao, Biing-Hwang Juang
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 2 months ago
Optimal Distributed Online Prediction using Mini-Batches
Online prediction methods are typically presented as serial algorithms running on a single processor. However, in the age of web-scale prediction problems, it is increasingly comm...
Ofer Dekel, Ran Gilad-Bachrach, Ohad Shamir, Lin X...