Sciweavers

502 search results - page 95 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
ESORICS
2010
Springer
13 years 5 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
SIGCOMM
2004
ACM
14 years 1 months ago
Locating internet bottlenecks: algorithms, measurements, and implications
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interest to both network operators and researchers. For example, knowing where bottlen...
Ningning Hu, Erran L. Li, Zhuoqing Morley Mao, Pet...
PPOPP
2006
ACM
14 years 1 months ago
On-line automated performance diagnosis on thousands of processes
Performance analysis tools are critical for the effective use of large parallel computing resources, but existing tools have failed to address three problems that limit their scal...
Philip C. Roth, Barton P. Miller
CVPR
2009
IEEE
15 years 3 months ago
Multi-Camera Activity Correlation Analysis
We propose a novel approach for modelling correlations between activities in a busy public space captured by multiple non-overlapping and uncalibrated cameras. In our approach, ...
Chen Change Loy (Queen Mary, University of London)...
BMCBI
2005
101views more  BMCBI 2005»
13 years 7 months ago
MASQOT: a method for cDNA microarray spot quality control
Background: cDNA microarray technology has emerged as a major player in the parallel detection of biomolecules, but still suffers from fundamental technical problems. Identifying ...
Max Bylesjö, Daniel Eriksson, Andreas Sjö...