Sciweavers

1266 search results - page 185 / 254
» Detecting Inconsistencies in Distributed Data
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
SIGCOMM
2010
ACM
13 years 10 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...
CCR
2004
168views more  CCR 2004»
13 years 10 months ago
Coping with irregular spatio-temporal sampling in sensor networks
Wireless sensor networks have attracted attention from a diverse set of researchers, due to the unique combination of distributed, resource and data processing constraints. Howeve...
Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, De...
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 8 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
BMCBI
2010
105views more  BMCBI 2010»
13 years 10 months ago
Evaluation of fecal mRNA reproducibility via a marginal transformed mixture modeling approach
Background: Developing and evaluating new technology that enables researchers to recover gene-expression levels of colonic cells from fecal samples could be key to a non-invasive ...
Nysia I. George, Joanne R. Lupton, Nancy D. Turner...