Sciweavers

88 search results - page 10 / 18
» An Immunological Approach to Change Detection: Algorithms, A...
Sort
View
SIGCOMM
2004
ACM
14 years 4 days ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...
KDD
2005
ACM
119views Data Mining» more  KDD 2005»
14 years 6 days ago
LIPED: HMM-based life profiles for adaptive event detection
In this paper, the proposed LIPED (LIfe Profile based Event Detection) employs the concept of life profiles to predict the activeness of event for effective event detection. A gro...
Chien Chin Chen, Meng Chang Chen, Ming-Syan Chen
MINENET
2005
ACM
14 years 8 days ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
14 years 27 days ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
AICCSA
2008
IEEE
266views Hardware» more  AICCSA 2008»
14 years 1 months ago
A novel flow-sensitive type and effect analysis for securing C code
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
Syrine Tlili, Mourad Debbabi