Sciweavers

1351 search results - page 217 / 271
» An Analysis of Inference with the Universum
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
Steven Noel, Sushil Jajodia
ICMCS
2005
IEEE
100views Multimedia» more  ICMCS 2005»
15 years 3 months ago
A Player-Possession Acquisition System for Broadcast Soccer Video
A semi-auto system is developed to acquire playerpossession for broadcast soccer video, whose objective is to minimize the manual work. This research is important because acquirin...
Xinguo Yu, Tze Sen Hay, Xin Yan, Engsiong Chng
AOSD
2005
ACM
15 years 3 months ago
Towards just-in-time middleware architectures
Middleware becomes increasingly important in building distributed applications. Conventional middleware systems are designed, implemented, and packaged before applications are dev...
Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen
IMC
2005
ACM
15 years 3 months ago
Combining Filtering and Statistical Methods for Anomaly Detection
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Augustin Soule, Kavé Salamatian, Nina Taft
MINENET
2005
ACM
15 years 3 months ago
Shrink: a tool for failure diagnosis in IP networks
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...