Sciweavers

295 search results - page 13 / 59
» Differentially-private network trace analysis
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
NSDI
2004
13 years 11 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy
DATE
2006
IEEE
127views Hardware» more  DATE 2006»
14 years 4 months ago
A signal theory based approach to the statistical analysis of combinatorial nanoelectronic circuits
In this paper we present a method which allows the statistical analysis of nanoelectronic Boolean networks with respect to timing uncertainty and noise. All signals are considered...
Oliver Soffke, Peter Zipf, Tudor Murgan, Manfred G...
MOMM
2009
ACM
172views Communications» more  MOMM 2009»
14 years 2 months ago
Analysis of video streaming with SP and SI frames in UMTS mobile networks
In this paper we discuss possible benefits of transmitting SI frames as an error resilience tool in UMTS video streaming. SP and SI frames can be used to stop temporal error prop...
Luca Superiori, Markus Rupp, Wolfgang Karner
CONEXT
2006
ACM
14 years 1 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...