Sciweavers

691 search results - page 66 / 139
» Control Choices and Network Effects in Hypertext Systems
Sort
View
114
Voted
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 7 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
CDC
2008
IEEE
147views Control Systems» more  CDC 2008»
15 years 8 months ago
Clustering neural spike trains with transient responses
— The detection of transient responses, i.e. non– stationarities, that arise in a varying and small fraction of the total number of neural spike trains recorded from chronicall...
John D. Hunter, Jianhong Wu, John G. Milton
MHCI
2009
Springer
15 years 8 months ago
Information empowerment through mobile learning
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...
94
Voted
CLUSTER
2005
IEEE
15 years 7 months ago
Minimizing the Network Overhead of Checkpointing in Cycle-harvesting Cluster Environments
Cycle-harvesting systems such as Condor have been developed to make desktop machines in a local area (which are often similar to clusters in hardware configuration) available as ...
Daniel Nurmi, John Brevik, Richard Wolski
EXPCS
2007
15 years 5 months ago
An active approach to measuring routing dynamics induced by autonomous systems
We present an active measurement study of the routing dynamics induced by AS-path prepending, a common method for controlling the inbound traffic of a multi-homed ISP. Unlike oth...
Samantha Lo, Rocky K. C. Chang, Lorenzo Colitti