Sciweavers

249 search results - page 38 / 50
» A nonself space approach to network anomaly detection
Sort
View
PERCOM
2010
ACM
14 years 7 months ago
Towards automated verification of autonomous networks: A case study in self-configuration
In autonomic networks, the self-configuration of network entities is one of the most desirable properties. In this paper, we show how formal verification techniques can verify the ...
JaeSeung Song, Tiejun Ma, Peter R. Pietzuch
CVIU
2010
429views more  CVIU 2010»
14 years 9 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
75
Voted
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 3 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
86
Voted
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 15 days ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski