Sciweavers

404 search results - page 73 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
14 years 10 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 4 months ago
Discovering Packet Structure through Lightweight Hierarchical Clustering
— The complexity of current Internet applications makes the understanding of network traffic a challenging task. By providing larger-scale aggregates for analysis, unsupervised ...
Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, ...
88
Voted
DEBS
2008
ACM
14 years 11 months ago
Replica placement for high availability in distributed stream processing systems
A significant number of emerging on-line data analysis applications require the processing of data streams, large amounts of data that get updated continuously, to generate output...
Thomas Repantis, Vana Kalogeraki
102
Voted
ICS
2009
Tsinghua U.
15 years 2 months ago
Exploring pattern-aware routing in generalized fat tree networks
New static source routing algorithms for High Performance Computing (HPC) are presented in this work. The target parallel architectures are based on the commonly used fattree netw...
Germán Rodríguez, Ramón Beivi...
GLOBECOM
2007
IEEE
14 years 11 months ago
Route Optimization for Large Scale Network Mobility Assisted by BGP
—This paper presents a novel scheme that enables IPv6 mobile networks to perform optimal route optimization. The proposed scheme exploits features of the widely deployed border g...
Feriel Mimoune, Farid Naït-Abdesselam, Tarik ...