Sciweavers

12301 search results - page 2316 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
116
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
P2P
2008
IEEE
137views Communications» more  P2P 2008»
15 years 9 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
ACIVS
2007
Springer
15 years 9 months ago
Model-Based Image Segmentation for Multi-view Human Gesture Analysis
Multi-camera networks bring in potentials for a variety of vision-based applications through provisioning of rich visual information. In this paper a method of image segmentation f...
Chen Wu, Hamid K. Aghajan
PAM
2007
Springer
15 years 9 months ago
Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware
Abstract. Tracing traffic using commodity hardware in contemporary highspeed access or aggregation networks such as 10-Gigabit Ethernet is an increasingly common yet challenging t...
Fabian Schneider, Jörg Wallerich, Anja Feldma...
PAM
2007
Springer
15 years 9 months ago
Two Days in the Life of the DNS Anycast Root Servers
The DNS root nameservers routinely use anycast in order to improve their service to clients and increase their resilience against various types of failures. We study DNS traffic co...
Ziqian Liu, Bradley Huffaker, Marina Fomenkov, Nev...
« Prev « First page 2316 / 2461 Last » Next »