Sciweavers

1298 search results - page 183 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
JMIV
2006
176views more  JMIV 2006»
15 years 3 months ago
Centroidal Voronoi Tessellation Algorithms for Image Compression, Segmentation, and Multichannel Restoration
Centroidal Voronoi tessellations (CVT's) are special Voronoi tessellations for which the generators of the tessellation are also the centers of mass (or means) of the Voronoi ...
Qiang Du, Max Gunzburger, Lili Ju, Xiaoqiang Wang
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
130
Voted
SRDS
2010
IEEE
15 years 1 months ago
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection so...
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, J...
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...
163
Voted
IJIIDS
2008
201views more  IJIIDS 2008»
15 years 3 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...