Sciweavers

ICDCS
2010
IEEE
13 years 8 months ago
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
—Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-andcontrol. Despite the commonality of their substrates, we show that the different g...
Ting-Fang Yen, Michael K. Reiter
CIARP
2009
Springer
13 years 8 months ago
Pigmented Skin Lesions Classification Using Dermatoscopic Images
In this paper we propose a machine learning approach to classify melanocytic lesions in malignant and benign from dermatoscopic images. The image database is composed of 433 benign...
Germán Capdehourat, Andrés Corez, An...
INFOCOM
2003
IEEE
13 years 9 months ago
Server-based Inference of Internet Link Lossiness
— We investigate the problem of inferring the packet loss characteristics of Internet links using server-based measurements. Unlike much of existing work on network tomography th...
Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang
CNSR
2006
IEEE
139views Communications» more  CNSR 2006»
13 years 10 months ago
Genetic Programming Based WiFi Data Link Layer Attack Detection
This paper presents a genetic programming based detection system for Data Link layer attacks on a WiFi network. We explore the use of two different fitness functions in order to ...
Patrick LaRoche, A. Nur Zincir-Heywood
GW
2007
Springer
135views Biometrics» more  GW 2007»
13 years 10 months ago
Person-Independent 3D Sign Language Recognition
In this paper, we present a person independent 3D system for judging the correctness of a sign. The system is camera-based, using computer vision techniques to track the hand and e...
Jeroen Lichtenauer, Gineke A. ten Holt, Marcel J. ...
CICLING
2007
Springer
13 years 10 months ago
A Mixed Trigrams Approach for Context Sensitive Spell Checking
This paper addresses the problem of real-word spell checking, i.e., the detection and correction of typos that result in real words of the target language. This paper proposes a me...
Davide Fossati, Barbara Di Eugenio
CEAS
2007
Springer
13 years 10 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...
GLOBECOM
2007
IEEE
13 years 11 months ago
A Scalable Bloom Filter for Membership Queries
—Bloom filters allow membership queries over sets with allowable errors. It is widely used in databases, networks and distributed systems and it has great potential for distribut...
Kun Xie, Yinghua Min, Dafang Zhang, Jigang Wen, Ga...
IEEEARES
2008
IEEE
13 years 11 months ago
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set
In this work, AdaBoost and C4.5, are employed for classifying Skype direct (UDP and TCP) communications from traffic log files. Pre-processing is applied to the traffic data to ex...
Duffy Angevine, A. Nur Zincir-Heywood
CCGRID
2008
IEEE
13 years 11 months ago
Bad Words: Finding Faults in Spirit's Syslogs
—Accurate fault detection is a key element of resilient computing. Syslogs provide key information regarding faults, and are found on nearly all computing systems. Discovering ne...
Jon Stearley, Adam J. Oliner