Sciweavers

642 search results - page 110 / 129
» Detecting Spoofed Packets
Sort
View
CCR
2002
112views more  CCR 2002»
15 years 1 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
DEDS
2002
119views more  DEDS 2002»
15 years 1 months ago
Diagnosing Discrete-Event Systems: Extending the "Diagnoser Approach" to Deal with Telecommunication Networks
Abstract. Detection and isolation of failures in large and complex systems such as telecommunication networks are crucial and challenging tasks. The problem considered here is that...
Laurence Rozé, Marie-Odile Cordier
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 3 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
DCC
2002
IEEE
16 years 1 months ago
Iterated Denoising for Image Recovery
In this paper we propose an algorithm for image recovery where completely lost blocks in an image/video-frame are recovered using spatial information surrounding these blocks. Our...
Onur G. Guleryuz
ICCD
2008
IEEE
136views Hardware» more  ICCD 2008»
15 years 10 months ago
A resource efficient content inspection system for next generation Smart NICs
— The aggregate power consumption of the Internet is increasing at an alarming rate, due in part to the rapid increase in the number of connected edge devices such as desktop PCs...
Karthik Sabhanatarajan, Ann Gordon-Ross