Sciweavers

3370 search results - page 517 / 674
» Correlation Embedding Analysis
Sort
View
ACSAC
2005
IEEE
14 years 4 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 4 months ago
The Mobile Internet: The Pioneering Users' Adoption Decisions
Substantial financial and technological investments by private and public organizations have resulted in the delivery of the third generation mobile technologies, although the jou...
Ann Fogelgren-Pedersen
IEEEPACT
2005
IEEE
14 years 4 months ago
Store-Ordered Streaming of Shared Memory
Coherence misses in shared-memory multiprocessors account for a substantial fraction of execution time in many important scientific and commercial workloads. Memory streaming prov...
Thomas F. Wenisch, Stephen Somogyi, Nikolaos Harda...
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
14 years 4 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
PEWASUN
2005
ACM
14 years 4 months ago
Characterizing and modeling user mobility in a cellular data network
The demand for cellular data networks is expected to increase with 3G and beyond technologies accompanied by highbandwidth consumer services, such as wireless video and camera pho...
Emir Halepovic, Carey L. Williamson