Sciweavers

885 search results - page 55 / 177
» Large-scale behavioral targeting
Sort
View
NETWORK
2008
94views more  NETWORK 2008»
14 years 9 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
ROBOCUP
2009
Springer
110views Robotics» more  ROBOCUP 2009»
15 years 4 months ago
A Lua-based Behavior Engine for Controlling the Humanoid Robot Nao
The high-level decision making process of an autonomous robot can be seen as an hierarchically organised entity, where strategical decisions are made on the topmost layer, while th...
Tim Niemüller, Alexander Ferrein, Gerhard Lak...
DIMVA
2007
14 years 11 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
CORR
2007
Springer
75views Education» more  CORR 2007»
14 years 9 months ago
Outage Behavior of Discrete Memoryless Channels Under Channel Estimation Errors
Classically, communication systems are designed assuming perfect channel state information at the receiver and/or transmitter. However, in many practical situations, only an estim...
Pablo Piantanida, Gerald Matz, Pierre Duhamel
ICSE
2009
IEEE-ACM
15 years 4 months ago
DYVISE: Performance analysis of production systems research demonstration
Many of today’s complex systems are multithreaded servers that effectively run forever and need to work under varying loads and environments. Understanding the behavior of such ...
Steven P. Reiss