Sciweavers

1661 search results - page 108 / 333
» Distributed Top-K Monitoring
Sort
View
WORM
2004
13 years 11 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
IDEAL
2000
Springer
14 years 1 months ago
Real-Time Web Data Mining and Visualisation
This paper presents new services for intelligent monitoring and visualising user accesses to a university's web site. These are based on the use of data mining techniques to p...
Li Bai, Ni Guohua
ICDCS
2007
IEEE
14 years 4 months ago
EnviroMic: Towards Cooperative Storage and Retrieval in Audio Sensor Networks
This paper presents the design, implementation, and evaluation of EnviroMic, a novel distributed acoustic monitoring, storage, and trace retrieval system. Audio represents one of ...
Liqian Luo, Qing Cao, Chengdu Huang, Tarek F. Abde...
IPPS
2007
IEEE
14 years 4 months ago
A Global Security Architecture for Intrusion Detection on Computer Networks
— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bido...
ICALP
2003
Springer
14 years 3 months ago
Resource Access and Mobility Control with Dynamic Privileges Acquisition
µKlaim is a process language that permits programming distributed systems made up of several mobile components interacting through multiple distributed tuple spaces. We present th...
Daniele Gorla, Rosario Pugliese