Sciweavers

503 search results - page 91 / 101
» IP Queuing Analysis
Sort
View
COMPGEOM
2005
ACM
14 years 11 months ago
Star splaying: an algorithm for repairing delaunay triangulations and convex hulls
Star splaying is a general-dimensional algorithm that takes as input a triangulation or an approximation of a convex hull, and produces the Delaunay triangulation, weighted Delaun...
Jonathan Richard Shewchuk
ICISC
2004
169views Cryptology» more  ICISC 2004»
14 years 11 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
CN
2007
137views more  CN 2007»
14 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
IPM
2008
120views more  IPM 2008»
14 years 9 months ago
An information-pattern-based approach to novelty detection
ct 9 In this paper, a new novelty detection approach based on the identification of sentence level information patterns is 10 proposed. First, ``novelty'' is redefined ba...
Xiaoyan Li, W. Bruce Croft
CORR
2007
Springer
160views Education» more  CORR 2007»
14 years 9 months ago
On the Correlation of Geographic and Network Proximity at Internet Edges and its Implications for Mobile Unicast and Multicast R
Signicant eort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing ecient mobile multicast man...
Thomas C. Schmidt, Matthias Wählisch, Ying Zh...