Sciweavers

2956 search results - page 270 / 592
» Targeted Data Prefetching
Sort
View
198
Voted
RAID
2007
Springer
15 years 9 months ago
Comparing Anomaly Detection Techniques for HTTP
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been...
Kenneth L. Ingham, Hajime Inoue
113
Voted
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 9 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
95
Voted
ICDM
2006
IEEE
129views Data Mining» more  ICDM 2006»
15 years 9 months ago
Keyword Generation for Search Engine Advertising
Keyword3 generation for search engine advertising is an important problem for sponsored search or paidplacement advertising. A recent strategy in this area is bidding on nonobviou...
Amruta Joshi, Rajeev Motwani
110
Voted
3DIM
2005
IEEE
15 years 9 months ago
An Improved Calibration Technique for Coupled Single-Row Telemeter and CCD Camera
Toward a successful 3D and textural reconstruction of urban scenes, the use of both single-row based telemetric and photographic data in a same framework has proved to be a powerf...
Romain Dupont, Renaud Keriven, Philippe Fuchs
DSN
2005
IEEE
15 years 9 months ago
Fatih: Detecting and Isolating Malicious Routers
Network routers occupy a key role in modern data transport and consequently are attractive targets for attackers. By manipulating, diverting or dropping packets arriving at a comp...
Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo...