Sciweavers

772 search results - page 99 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
DSN
2007
IEEE
15 years 6 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
PDPTA
2004
15 years 1 months ago
An Evaluation of Distributed Scheduling Algorithms Within the DESPOT Architecture
Current systems for managing workload on clusters of workstations, particularly those available for Linuxbased (Beowulf) clusters, are typically based on traditional process-based...
Daniel Andresen, Jeffrey Lebak, Ethan Bowker
NETWORK
2007
100views more  NETWORK 2007»
14 years 11 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
IJIT
2004
15 years 1 months ago
Morphing Human Faces: Automatic Control Points Selection And Color Transition
In this paper, we propose a morphing method by which face color images can be freely transformed. The main focus of this work is the transformation of one face image to another. Th...
Stephen Karungaru, Minoru Fukumi, Norio Akamatsu
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
16 years 6 days ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han