Sciweavers

47 search results - page 6 / 10
» saint 2008
Sort
View
SAINT
2008
IEEE
14 years 20 days ago
ROOK: Multi-session Based Network Security Event Detector
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Masayoshi Mizutani, Shin Shirahata, Masaki Minami,...
SAINT
2008
IEEE
14 years 20 days ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
SAINT
2008
IEEE
14 years 20 days ago
Analysis of a Self-Organizing Maintenance Algorithm under Constant Churn
An increasing proportion of distributed hash tables (DHTs) maintain additional routing information regarding each node’s immediately surrounding neighbors in a network overlay. ...
Richard Price, Tien Tuan Anh Dinh, Georgios K. The...
SAINT
2008
IEEE
14 years 20 days ago
Detection of Pedestrians Using Subtraction Stereo
Abstract— In this paper, detection of pedestrians using “subtraction stereo” is discussed. Subtraction stereo is a stereo vision method that focuses on the movement of object...
Yuki Hashimoto, Yusuke Matsuki, Tatsuya Nakanishi,...
LREC
2008
101views Education» more  LREC 2008»
13 years 7 months ago
Investigating the Structure of Procedural Texts for Answering How-to Questions
This paper presents ongoing work dedicated to parsing the textual structure of procedural texts. We propose here a model for the intructional structure and criteria to identify it...
Estelle Delpech, Patrick Saint-Dizier