Sciweavers

3708 search results - page 144 / 742
» Approximating Betweenness Centrality
Sort
View
NSDI
2008
15 years 3 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
74
Voted
ECSCW
2001
15 years 2 months ago
Flexible support for application-sharing architecture
Current application-sharing systems support a single architecture for all collaborations, though different systems support different architectures We have developed a system that s...
Goopeel Chung, Prasun Dewan
102
Voted
CORR
2008
Springer
126views Education» more  CORR 2008»
15 years 27 days ago
One shot schemes for decentralized quickest change detection
This work considers the problem of quickest detection with N distributed sensors that receive sequential observations either in discrete or in continuous time from the environment....
Olympia Hadjiliadis, Hongzhong Zhang, H. Vincent P...
92
Voted
CORR
2007
Springer
94views Education» more  CORR 2007»
15 years 23 days ago
Universal Quantile Estimation with Feedback in the Communication-Constrained Setting
Abstract— We consider the following problem of decentralized statistical inference: given i.i.d. samples from an unknown distribution, estimate an arbitrary quantile subject to l...
Ram Rajagopal, Martin J. Wainwright
ICWS
2009
IEEE
14 years 10 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart