Sciweavers

98 search results - page 19 / 20
» Utilizing network features for privacy violation detection
Sort
View
NETGAMES
2006
ACM
13 years 11 months ago
Peer clustering: a hybrid approach to distributed virtual environments
This paper proposes a hybrid architecture for distributed virtual environments, utilizing servers alongside peer-to-peer components. Current research into peer-based systems seeks...
Alvin Chen, Richard R. Muntz
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 5 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
SIGKDD
2008
125views more  SIGKDD 2008»
13 years 5 months ago
Incremental pattern discovery on streams, graphs and tensors
Incremental pattern discovery targets streaming applications where the data continuously arrive incrementally. The questions are how to find patterns (main trends) incrementally; ...
Jimeng Sun
IS
2010
13 years 4 months ago
ROC analysis of a fatigue classifier for vehicular drivers
— Few systems have been developed for the detection of fatigue / stress level of a vehicular driver in order to monitor and control the alertness level for preventing road accide...
Mahesh M. Bundele, Rahul Banerjee
NDSS
2007
IEEE
13 years 12 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...