Sciweavers

2269 search results - page 413 / 454
» Behavioral Intrusion Detection
Sort
View
EDBT
2008
ACM
133views Database» more  EDBT 2008»
13 years 11 months ago
Action synchronization in P2P system testing
Testing peer-to-peer (P2P) systems is difficult because of the high numbers of nodes which can be heterogeneous and volatile. A test case may be composed of several ordered action...
Eduardo Cunha de Almeida, Gerson Sunyé, Pat...
DAGSTUHL
2010
13 years 11 months ago
Towards Automatic Feature-based Visualization
Visualizations are well suited to communicate large amounts of complex data. With increasing resolution in the spatial and temporal domain simple imaging techniques meet their lim...
Heike Jänicke, Gerik Scheuermann
IJCAI
2007
13 years 11 months ago
Dynamically Weighted Hidden Markov Model for Spam Deobfuscation
Spam deobfuscation is a processing to detect obfuscated words appeared in spam emails and to convert them back to the original words for correct recognition. Lexicon tree hidden M...
Seunghak Lee, Iryoung Jeong, Seungjin Choi
NETWORKING
2008
13 years 11 months ago
Concurrent Multipath Transfer Using SCTP Multihoming: Introducing the Potentially-Failed Destination State
Previously, we identified the failure-induced receive buffer (rbuf) blocking problem in Concurrent Multipath Transfer using SCTP multihoming (CMT), and proposed CMT with a Potentia...
Preethi Natarajan, Nasif Ekiz, Paul D. Amer, Janar...
UAI
2008
13 years 11 months ago
CT-NOR: Representing and Reasoning About Events in Continuous Time
We present a generative model for representing and reasoning about the relationships among events in continuous time. We apply the model to the domain of networked and distributed...
Aleksandr Simma, Moisés Goldszmidt, John Ma...