Sciweavers

502 search results - page 33 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
TRIDENTCOM
2005
IEEE
14 years 2 months ago
TBI: End-to-End Network Performance Measurement Testbed for Empirical Bottleneck Detection
— Recent advances in networking include new bandwidth-intensive applications, sophisticated protocols that enable real-time data and multimedia delivery and aspects of network se...
Prasad Calyam, Dima Krymskiy, Mukundan Sridharan, ...
SIGSOFT
2009
ACM
14 years 3 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
ICIP
2008
IEEE
14 years 10 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...
WWW
2008
ACM
14 years 9 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...