Sciweavers

1355 search results - page 255 / 271
» Alternating Timed Automata over Bounded Time
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 26 days ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
INFOCOM
2003
IEEE
14 years 26 days ago
Large-scale Data Collection: a Coordinated Approach
— In this paper we consider the problem of collecting a large amount of data from several different hosts to a single destination in a wide-area network. Often, due to congestion...
William C. Cheng, Cheng-Fu Chou, Leana Golubchik, ...
IDMS
2001
Springer
142views Multimedia» more  IDMS 2001»
14 years 1 days ago
The Case for Streaming Multimedia with TCP
In this paper, we revisit and challenge the dogma that TCP is an undesirable choice for streaming multimedia, video in particular. For some time, the common view held that neither ...
Charles Krasic, Kang Li, Jonathan Walpole
AAAI
2007
13 years 10 months ago
Temporal and Information Flow Based Event Detection from Social Text Streams
Recently, social text streams (e.g., blogs, web forums, and emails) have become ubiquitous with the evolution of the web. In some sense, social text streams are sensors of the rea...
Qiankun Zhao, Prasenjit Mitra, Bi Chen
ISLPED
2007
ACM
57views Hardware» more  ISLPED 2007»
13 years 9 months ago
Resource area dilation to reduce power density in throughput servers
Throughput servers using simultaneous multithreaded (SMT) processors are becoming an important paradigm with products such as Sun's Niagara and IBM Power5. Unfortunately, thr...
Michael D. Powell, T. N. Vijaykumar