Sciweavers

357 search results - page 65 / 72
» An Approach to Detect Executable Content for Anomaly Based N...
Sort
View
ANCS
2005
ACM
14 years 1 months ago
SSA: a power and memory efficient scheme to multi-match packet classification
New network applications like intrusion detection systems and packet-level accounting require multi-match packet classification, where all matching filters need to be reported. Te...
Fang Yu, T. V. Lakshman, Martin Austin Motoyama, R...
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 8 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
SOUPS
2010
ACM
13 years 11 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill
ISPASS
2009
IEEE
14 years 2 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
ATAL
2008
Springer
13 years 10 months ago
Dynamic Bayesian network based interest estimation for visual attentive presentation agents
In this paper, we report on an interactive system and the results ofa formal user study that was carried out with the aim of comparing two approaches to estimating users' int...
Boris Brandherm, Helmut Prendinger, Mitsuru Ishizu...