Sciweavers

23988 search results - page 4546 / 4798
» Social Network Computing
Sort
View
RAID
2004
Springer
15 years 9 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
RAID
2004
Springer
15 years 9 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
UCS
2004
Springer
15 years 9 months ago
Real-World Interaction with Camera Phones
With the integration of cameras, mobile phones have evolved into networked personal image capture devices. Camera-phones can perform image processing tasks on the device itself an...
Michael Rohs
VLDB
2004
ACM
101views Database» more  VLDB 2004»
15 years 9 months ago
HiFi: A Unified Architecture for High Fan-in Systems
Advances in data acquisition and sensor technologies are leading towards the development of “High Fan-in” architectures: widely distributed systems whose edges consist of nume...
Owen Cooper, Anil Edakkunni, Michael J. Franklin, ...
WISA
2004
Springer
15 years 9 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traf...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
« Prev « First page 4546 / 4798 Last » Next »