Sciweavers

741 search results - page 130 / 149
» Tools and techniques for Network Forensics
Sort
View
76
Voted
SIGMETRICS
2008
ACM
14 years 10 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
64
Voted
SIGMETRICS
2008
ACM
144views Hardware» more  SIGMETRICS 2008»
14 years 10 months ago
Co-designing the failure analysis and monitoring of large-scale systems
Large-scale distributed systems provide the backbone for numerous distributed applications and online services. These systems span over a multitude of computing nodes located at d...
Abhishek Chandra, Rohini Prinja, Sourabh Jain, Zhi...
AI
2002
Springer
14 years 10 months ago
Programming backgammon using self-teaching neural nets
TD-Gammon is a neural network that is able to teach itself to play backgammon solely by playing against itself and learning from the results. Starting from random initial play, TD...
Gerald Tesauro
109
Voted
SOCINFO
2010
14 years 8 months ago
Dynamic Context-Sensitive PageRank for Expertise Mining
Abstract. Online tools for collaboration and social platforms have become omnipresent in Web-based environments. Interests and skills of people evolve over time depending in perfor...
Daniel Schall, Schahram Dustdar
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
14 years 8 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero