Sciweavers

123 search results - page 17 / 25
» A network intrusion detection method using independent compo...
Sort
View
ACISP
2008
Springer
14 years 2 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
COR
2008
131views more  COR 2008»
13 years 7 months ago
Queueing analysis of a server node in transaction processing middleware systems
Quantitative performance modeling of complex information systems is of immense importance for designing enterprise e-business infrastructures and applications. In this paper, we p...
Wei Xiong, Tayfur Altiok
ICML
2010
IEEE
13 years 9 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
ICA
2004
Springer
14 years 1 months ago
3D Spatial Analysis of fMRI Data on a Word Perception Task
We discuss a 3D spatial analysis of fMRI data taken during a combined word perception and motor task. The event - based experiment was part of a study to investigate the network of...
Ingo R. Keck, Fabian J. Theis, Peter Gruber, Elmar...
COMAD
2009
13 years 9 months ago
Categorizing Concepts for Detecting Drifts in Stream
Mining evolving data streams for concept drifts has gained importance in applications like customer behavior analysis, network intrusion detection, credit card fraud detection. Se...
Sharanjit Kaur, Vasudha Bhatnagar, Sameep Mehta, S...