Sciweavers

4679 search results - page 116 / 936
» Modeling When Connections Are the Problem
Sort
View
ACSAC
2008
IEEE
15 years 8 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ISPDC
2008
IEEE
15 years 8 months ago
Algorithms for Network Topology Discovery using End-to-End Measurements
Identifying and inferring performances of a network topology is a well known problem. Achieving this by using only end-to-end measurements at the application level is a method kno...
Laurent Bobelin, Traian Muntean
MOBICOM
2006
ACM
15 years 7 months ago
Status packet deprecation and store-forward routing in AUSNet
AUSNet is a functional network of autonomous undersea vehicles. We present two novel algorithms to enhance AUSNet. In live inwater testing, a packet queueing problem in which stal...
Matthew M. Haag, Emmanuel Agu, Rick Komerska, Stev...
DCOSS
2005
Springer
15 years 7 months ago
Infrastructure-Establishment from Scratch in Wireless Sensor Networks
Abstract. We present a distributed, localized and integrated approach for establishing both low-level (i.e. exploration of 1-hop neighbors, interference avoidance) and high-level (...
Stefan Funke, Nikola Milosavljevic
NIPS
2008
15 years 3 months ago
Privacy-preserving logistic regression
This paper addresses the important tradeoff between privacy and learnability, when designing algorithms for learning from private databases. We focus on privacy-preserving logisti...
Kamalika Chaudhuri, Claire Monteleoni