Sciweavers

3119 search results - page 570 / 624
» Performance Analysis of Wireless Multihop Data Networks
Sort
View
138
Voted
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 5 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
125
Voted
MOBISYS
2004
ACM
16 years 3 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...
157
Voted
CCS
2008
ACM
15 years 5 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
159
Voted
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 10 months ago
Using pair approximations to predict takeover dynamics in spatially structured populations
The topological properties of a network directly impact the flow of information through a system. For example, in natural populations, the network of inter-individual contacts aff...
Joshua L. Payne, Margaret J. Eppstein
148
Voted
WWW
2010
ACM
15 years 10 months ago
Keyword extraction for social snippets
Today, a huge amount of text is being generated for social purposes on social networking services on the Web. Unlike traditional documents, such text is usually extremely short an...
Zhenhui Li, Ding Zhou, Yun-Fang Juan, Jiawei Han