Sciweavers

945 search results - page 151 / 189
» Graph Types
Sort
View
ACSAC
2008
IEEE
15 years 8 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
AICCSA
2008
IEEE
292views Hardware» more  AICCSA 2008»
15 years 8 months ago
Enumeration of maximal clique for mining spatial co-location patterns
This paper presents a systematic approach to mine colocation patterns in Sloan Digital Sky Survey (SDSS) data. SDSS Data Release 5 (DR5) contains 3.6 TB of data. Availability of s...
Ghazi Al-Naymat
IAT
2008
IEEE
15 years 8 months ago
Adapting to Changing Resource Requirements for Coalition Formation in Self-Organized Social Networks
Coalition formation in social networks, consisting of a graph of interdependent agents, allows many choices of which task to select and with whom to partner in the social network....
Levi Barton, Vicki H. Allan
IAT
2008
IEEE
15 years 8 months ago
Link-Based Anomaly Detection in Communication Networks
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
INFOCOM
2008
IEEE
15 years 8 months ago
Minimum Cost Data Aggregation with Localized Processing for Statistical Inference
—The problem of minimum cost in-network fusion of measurements, collected from distributed sensors via multihop routing is considered. A designated fusion center performs an opti...
Animashree Anandkumar, Lang Tong, Ananthram Swami,...