Sciweavers

6584 search results - page 1109 / 1317
» Distributed Shared Contexts
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
ICDCSW
2005
IEEE
15 years 9 months ago
Integrating Databases with Publish/Subscribe
Publish/subscribe is emerging as an appropriate communication paradigm for large-scale, widely-distributed systems. In this paper, we describe our work on integrating active datab...
Luis Vargas, Jean Bacon, Ken Moody
INFOCOM
2005
IEEE
15 years 9 months ago
On the effectiveness of DDoS attacks on statistical filtering
— Distributed Denial of Service (DDoS) attacks pose a serious threat to service availability of the victim network by severely degrading its performance. Recently, there has been...
Qiming Li, Ee-Chien Chang, Mun Choon Chan
ISCAS
2005
IEEE
128views Hardware» more  ISCAS 2005»
15 years 9 months ago
A study of encoding and decoding techniques for syndrome-based video coding
In conventional video coding, the complexity of an encoder is generally much higher than that of a decoder because of operations such as motion estimation consume significant com...
Min Wu, Anthony Vetro, Jonathan S. Yedidia, Huifan...
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 9 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
« Prev « First page 1109 / 1317 Last » Next »