Sciweavers

282 search results - page 36 / 57
» Improved Thumbprint and Its Application for Intrusion Detect...
Sort
View
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
15 years 11 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
NDSS
2006
IEEE
15 years 5 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....
WETICE
2007
IEEE
15 years 5 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
CVPR
2007
IEEE
16 years 1 months ago
Detection and segmentation of moving objects in highly dynamic scenes
Detecting and segmenting moving objects in dynamic scenes is a hard but essential task in a number of applications such as surveillance. Most existing methods only give good resul...
Aurélie Bugeau, Patrick Pérez
GCC
2007
Springer
15 years 5 months ago
Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks
Many Internet applications use overlay networks as their basic facilities, like resource sharing, collaborative computing, and so on. Considering the communication cost, most over...
Zhenhua Li, Guihai Chen