Sciweavers

16128 search results - page 2960 / 3226
» Distributed network scheduling
Sort
View
IMC
2009
ACM
15 years 9 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
IMC
2009
ACM
15 years 9 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
RECSYS
2009
ACM
15 years 9 months ago
Ordering innovators and laggards for product categorization and recommendation
Different buyers exhibit different purchasing behaviors. Some rush to purchase new products while others tend to be more cautious, waiting for reviews from people they trust. In...
Sarah K. Tyler, Shenghuo Zhu, Yun Chi, Yi Zhang
118
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
FOCS
2008
IEEE
15 years 9 months ago
Mixing Time of Exponential Random Graphs
A plethora of random graph models have been developed in recent years to study a range of problems on networks, driven by the wide availability of data from many social, telecommu...
Shankar Bhamidi, Guy Bresler, Allan Sly
« Prev « First page 2960 / 3226 Last » Next »