Sciweavers

195 search results - page 22 / 39
» An Information-theoretic Approach to Network Monitoring and ...
Sort
View
ECUMN
2004
Springer
14 years 4 days ago
Expedited Forwarding Delay Budget Through a Novel Call Admission Control
Abstract. Call admission control is a principal component for QoS delivery in IP networks. It determines the extent to which network resources are utilized. It determines also whet...
Hamada Alshaer, Eric Horlait
RAID
2010
Springer
13 years 4 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
INFOCOM
2006
IEEE
14 years 23 days ago
Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions
— We address the problem of energy efficient sensing by adaptively coordinating the sleep schedules of sensor nodes while guaranteeing that values of sleeping nodes can be recov...
Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak
FAABS
2004
Springer
14 years 3 days ago
Agent-Based Chemical Plume Tracing Using Fluid Dynamics
Abstract. This paper presents a rigorous evaluation of a novel, distributed chemical plume tracing algorithm. The algorithm is a combination of the best aspects of the two most pop...
Dimitri Zarzhitsky, Diana F. Spears, David R. Thay...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 9 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...