Sciweavers

543 search results - page 97 / 109
» Detecting anomalies in data streams using statecharts
Sort
View
IPPS
2007
IEEE
15 years 3 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
IROS
2007
IEEE
254views Robotics» more  IROS 2007»
15 years 3 months ago
3D datasets segmentation based on local attribute variation
— We present a Graph-based method for low-level segmentation of unfiltered 3D data. The core of this approach is based on the construction of a local neighborhood structure and ...
Carla Silva Rocha Aguiar, Sébastien Druon, ...
KDD
2008
ACM
165views Data Mining» more  KDD 2008»
15 years 10 months ago
Colibri: fast mining of large static and dynamic graphs
Low-rank approximations of the adjacency matrix of a graph are essential in finding patterns (such as communities) and detecting anomalies. Additionally, it is desirable to track ...
Hanghang Tong, Spiros Papadimitriou, Jimeng Sun, P...
VTC
2008
IEEE
196views Communications» more  VTC 2008»
15 years 4 months ago
Block Equalization and Generalized MLSE Arbitration for the HSPA WCDMA Uplink
Abstract— High Speed Packet Access (HSPA), the latest evolution of the Wideband Code Division Multiple Access (WCDMA) standard, provides higher uplink data rates using higher-ord...
Gregory E. Bottomley
89
Voted
INFOSCALE
2006
ACM
15 years 3 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray