Sciweavers

2414 search results - page 175 / 483
» Computing Normal Subgroups
Sort
View
SC
2004
ACM
14 years 2 months ago
Kosha: A Peer-to-Peer Enhancement for the Network File System
This paper presents Kosha, a peer-to-peer (p2p) enhancement for the widely-used Network File System (NFS). Kosha harvests redundant storage space on cluster nodes and user desktop...
Ali Raza Butt, Troy A. Johnson, Yili Zheng, Y. Cha...
RAID
2004
Springer
14 years 2 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
CCGRID
2003
IEEE
14 years 2 months ago
Criticality-based Analysis and Design of Unstructured Peer-to-Peer Networks as "Complex Systems"
— Due to enormous complexity of the unstructured peer-to-peer networks as large-scale, self-configure, and dynamic systems, the models used to characterize these systems are eit...
Farnoush Banaei Kashani, Cyrus Shahabi
CW
2002
IEEE
14 years 2 months ago
Direct Segmentation for Reverse Engineering
In Reverse Engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate co...
Marek Vanco, Guido Brunnett
CW
2002
IEEE
14 years 2 months ago
Mesh Median Filter for Smoothing 3-D Polygonal Surfaces
In this paper, we introduce a new mesh filtering method: a mesh median filter. This is an application of the median filter to smoothen 3-D noisy shapes given by triangle meshes...
Hirokazu Yagou, Alexander G. Belyaev, D. Weiz