Sciweavers

3785 search results - page 749 / 757
» Immune System Based Intrusion Detection System
Sort
View
SIGCOMM
2003
ACM
15 years 2 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
85
Voted
ISRR
2001
Springer
121views Robotics» more  ISRR 2001»
15 years 1 months ago
Towards a Realistic Medical Simulator using Virtual Environments and Haptic Interaction
This paper presents our experience towards the conception of a virtual reality medical simulator coupled with haptic interaction aimed at training surgeons. This area of research h...
Christian Laugier, César Mendoza, Kenneth S...
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
KDD
2010
ACM
253views Data Mining» more  KDD 2010»
15 years 1 months ago
Mining periodic behaviors for moving objects
Periodicity is a frequently happening phenomenon for moving objects. Finding periodic behaviors is essential to understanding object movements. However, periodic behaviors could b...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays, P...
CLUSTER
2004
IEEE
15 years 1 months ago
Improved message logging versus improved coordinated checkpointing for fault tolerant MPI
Fault tolerance is a very important concern for critical high performance applications using the MPI library. Several protocols provide automatic and transparent fault detection a...
Pierre Lemarinier, Aurelien Bouteiller, Thomas H&e...