Sciweavers

667 search results - page 78 / 134
» On Various Negative Translations
Sort
View
IWSOS
2007
Springer
15 years 3 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
MICAI
2007
Springer
15 years 3 months ago
Fuzzifying Clustering Algorithms: The Case Study of MajorClust
Among various document clustering algorithms that have been proposed so far, the most useful are those that automatically reveal the number of clusters and assign each target docum...
Eugene Levner, David Pinto, Paolo Rosso, David Alc...
INFOCOM
2006
IEEE
15 years 3 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
ISPASS
2006
IEEE
15 years 3 months ago
Friendly fire: understanding the effects of multiprocessor prefetches
Modern processors attempt to overcome increasing memory latencies by anticipating future references and prefetching those blocks from memory. The behavior and possible negative si...
Natalie D. Enright Jerger, Eric L. Hill, Mikko H. ...
SAINT
2006
IEEE
15 years 3 months ago
Cross-Cultural Study of Avatar Expression Interpretations
Avatars are increasingly used to express our emotions in our online communications. Such avatars are based on the assumption that avatar expressions are interpreted universally am...
Tomoko Koda, Toru Ishida