Sciweavers

205 search results - page 27 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
103
Voted
INFOSCALE
2006
ACM
15 years 5 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
IV
2009
IEEE
191views Visualization» more  IV 2009»
15 years 6 months ago
An Heuristic for the Construction of Intersection Graphs
Most methods for generating Euler diagrams describe the detection of the general structure of the final draw as the first and most important step. This information is often depi...
Paolo Simonetto, David Auber
ICMLA
2008
15 years 1 months ago
Automated Analysis for Detecting Beams in Laser Wakefield Simulations
Laser wakefield particle accelerators have shown the potential to generate electric fields thousands of times higher than those of conventional accelerators. The resulting extreme...
Daniela Mayumi Ushizima, Oliver Rübel, Prabha...
249
Voted

Lecture Notes
773views
16 years 9 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
CVPR
2007
IEEE
16 years 1 months ago
Capturing People in Surveillance Video
This paper presents reliable techniques for detecting, tracking, and storing keyframes of people in surveillance video. The first component of our system is a novel face detector ...
Rogerio Feris, Ying-li Tian, Arun Hampapur