Sciweavers

151 search results - page 9 / 31
» Cleaning a network with brushes
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 2 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
AAAI
2000
13 years 8 months ago
Semantics and Inference for Recursive Probability Models
In recent years, there have been several proposals that extend the expressive power of Bayesian networks with that of relational models. These languages open the possibility for t...
Avi Pfeffer, Daphne Koller
INTERNET
2007
131views more  INTERNET 2007»
13 years 7 months ago
Live Distributed Objects: Enabling the Active Web
Distributed computing has been slow to benefit from the productivity revolution that has transformed the desktop. We still treat the Web as a separate technology space: programmer...
Krzysztof Ostrowski, Ken Birman, Danny Dolev
COST
1994
Springer
146views Multimedia» more  COST 1994»
13 years 11 months ago
A Binding Architecture for Multimedia Networks
: An open architecture that achieves seamless binding between networking and multimedia devices is proposed. The building blocks of the binding architecture consist of a set of es,...
Aurel A. Lazar, Shailendra K. Bhonsle, Koon-Seng L...