Sciweavers

635 search results - page 104 / 127
» Automatic Discovery of Network Applications: A Hybrid Approa...
Sort
View
WWW
2005
ACM
14 years 8 months ago
Analysis of multimedia workloads with implications for internet streaming
In this paper, we study the media workload collected from a large number of commercial Web sites hosted by a major ISP and that collected from a large group of home users connecte...
Lei Guo, Songqing Chen, Zhen Xiao, Xiaodong Zhang
NDSS
2006
IEEE
14 years 1 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
NSDI
2007
13 years 10 months ago
Exploiting Similarity for Multi-Source Downloads Using File Handprints
Many contemporary approaches for speeding up large file transfers attempt to download chunks of a data object from multiple sources. Systems such as BitTorrent quickly locate sou...
Himabindu Pucha, David G. Andersen, Michael Kamins...
ALIFE
2002
13 years 7 months ago
Bioinspired Engineering of Exploration Systems for NASA and DoD
A new approach called bioinspired engineering of exploration systems (BEES) and its value for solving pressing NASA and DoD needs are described. Insects (for example honeybees and ...
Sarita Thakoor, Javaan S. Chahl, Mandyam V. Sriniv...
KDD
2010
ACM
318views Data Mining» more  KDD 2010»
13 years 6 months ago
DivRank: the interplay of prestige and diversity in information networks
Information networks are widely used to characterize the relationships between data items such as text documents. Many important retrieval and mining tasks rely on ranking the dat...
Qiaozhu Mei, Jian Guo, Dragomir R. Radev