Sciweavers

272 search results - page 41 / 55
» A flow based approach for SSH traffic detection
Sort
View
COMSWARE
2006
IEEE
14 years 2 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
CCR
2006
85views more  CCR 2006»
13 years 8 months ago
Troubleshooting wireless mesh networks
Effective network troubleshooting is critical for maintaining efficient and reliable network operation. Troubleshooting is especially challenging in multi-hop wireless networks be...
Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou
ICCV
2007
IEEE
14 years 10 months ago
Event Detection in Crowded Videos
Real-world actions occur often in crowded, dynamic environments. This poses a difficult challenge for current approaches to video event detection because it is difficult to segmen...
Yan Ke, Rahul Sukthankar, Martial Hebert
INTERSENSE
2006
ACM
14 years 2 months ago
QoS-aware mesh construction to enhance multicast routing in mobile ad hoc networks
— Mobile Ad-hoc Networks (MANETs) are seen as an essential technology to support future Pervasive Computing Scenarios and 4G networks. In a MANET, efficient support of multipoint...
Harald Tebbe, Andreas J. Kassler, Pedro M. Ruiz
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
14 years 9 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims