Sciweavers

1191 search results - page 110 / 239
» Distributed Detection of Information Flows
Sort
View
AMCS
2010
146views Mathematics» more  AMCS 2010»
13 years 9 months ago
Sensor network design for the estimation of spatially distributed processes
satisfactory network connectivity have dominated this line of research and abstracted away from the mathematical description of the physical processes underlying the observed pheno...
Dariusz Ucinski, Maciej Patan
JPDC
2006
87views more  JPDC 2006»
13 years 9 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
DFN
2003
13 years 10 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
CCGRID
2009
IEEE
14 years 3 months ago
Collusion Detection for Grid Computing
A common technique for result verification in grid computing is to delegate a computation redundantly to different workers and apply majority voting to the returned results. Howe...
Eugen Staab, Thomas Engel
ICMCS
2006
IEEE
108views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Efficient Speaker Detection via Target Dependent Data Reduction
Systems designed to extract time-critical information from large volumes of unstructured data must include the ability, both from an architectural and algorithmic point of view, t...
Upendra V. Chaudhari, Olivier Verscheure, Juan Hue...