Sciweavers

1075 search results - page 40 / 215
» Communities Detection in Large Networks
Sort
View
CCS
2006
ACM
15 years 1 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
SIGCOMM
2010
ACM
14 years 10 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
ICPR
2004
IEEE
15 years 10 months ago
Skin Detection: A Bayesian Network Approach
The automated detection and tracking of humans in computer vision necessitates improved modeling of the human skin appearance. In this paper we propose a Bayesian network approach...
Ira Cohen, Nicu Sebe, Theo Gevers, Thomas S. Huang
ICSE
2009
IEEE-ACM
15 years 4 months ago
Software Engineering for the Next Internet
The Internet no longer meets the world’s requirements. Recognition of the Internet architecture’s inherent flaws has opened a window of opportunity for fresh thinking: granti...
Pamela Zave
MOBIHOC
2010
ACM
14 years 7 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling