Sciweavers

7544 search results - page 1350 / 1509
» Network Forensics Analysis
Sort
View
IMC
2005
ACM
15 years 10 months ago
Combining Filtering and Statistical Methods for Anomaly Detection
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Augustin Soule, Kavé Salamatian, Nina Taft
SC
2005
ACM
15 years 10 months ago
Intelligent Feature Extraction and Tracking for Visualizing Large-Scale 4D Flow Simulations
Terascale simulations produce data that is vast in spatial, temporal, and variable domains, creating a formidable challenge for subsequent analysis. Feature extraction as a data r...
Fan-Yin Tzeng, Kwan-Liu Ma
SIGDOC
2005
ACM
15 years 10 months ago
Sensorium games: usability considerations for pervasive gaming
The Sensorium family of games provides a platform and environment for multiplayer games in a pervasive environment. Each player is equipped with a mote, which (along with those of...
S. N. I. Mount, Elena I. Gaura, Robert M. Newman
SIGECOM
2005
ACM
166views ECommerce» more  SIGECOM 2005»
15 years 10 months ago
A price-anticipating resource allocation mechanism for distributed shared clusters
In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed marketbased resource allocation system. Multiple users decide ...
Michal Feldman, Kevin Lai, Li Zhang
AP2PC
2005
Springer
15 years 10 months ago
Highly Available DHTs: Keeping Data Consistency After Updates
Abstract. The research in the paper is motivated by building a decentralized/P2P XML storage on top of a DHT (Distributed Hash Table). The storage must provide high data availabili...
Predrag Knezevic, Andreas Wombacher, Thomas Risse
« Prev « First page 1350 / 1509 Last » Next »