Sciweavers

1191 search results - page 84 / 239
» Distributed Detection of Information Flows
Sort
View
DEBS
2010
ACM
14 years 15 hour ago
Workload characterization for operator-based distributed stream processing applications
Operator-based programming languages provide an effective development model for large scale stream processing applications. A stream processing application consists of many runtim...
Xiaolan J. Zhang, Sujay Parekh, Bugra Gedik, Henri...
SEC
2007
13 years 10 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
SBACPAD
2003
IEEE
138views Hardware» more  SBACPAD 2003»
14 years 2 months ago
Finite Difference Simulations of the Navier-Stokes Equations Using Parallel Distributed Computing
 This paper discusses the implementation of a numerical algorithm for simulating incompressible fluid flows based on the finite difference method and designed for parallel compu...
João Paulo De Angeli, Andréa M. P. V...
CW
2003
IEEE
14 years 2 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
ICNP
2009
IEEE
13 years 6 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...