Sciweavers

1644 search results - page 32 / 329
» Finding Dominators in Practice
Sort
View
CCS
2006
ACM
14 years 13 days ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
CCR
2002
133views more  CCR 2002»
13 years 8 months ago
Crossover scaling effects in aggregated TCP traffic with congestion losses
We critically examine the claims that TCP congestion control contributes to the observed self-similar traffic rate correlations. A simulation model is designed to analyze aggregat...
Michael Liljenstam, Andrew T. Ogielski
WEA
2010
Springer
545views Algorithms» more  WEA 2010»
14 years 3 months ago
Experiments on Union-Find Algorithms for the Disjoint-Set Data Structure
Abstract. The disjoint-set data structure is used to maintain a collection of non-overlapping sets of elements from a finite universe. Algorithms that operate on this data structu...
Md. Mostofa Ali Patwary, Jean R. S. Blair, Fredrik...
TKDE
2002
141views more  TKDE 2002»
13 years 8 months ago
Algorithms for Finding Attribute Value Group for Binary Segmentation of Categorical Databases
We consider the problem of finding a set of attribute values that give a high quality binary segmentation of a database. The quality of a segmentation is defined by an objective fu...
Yasuhiko Morimoto, Takeshi Fukuda, Takeshi Tokuyam...
PARMA
2004
174views Database» more  PARMA 2004»
13 years 10 months ago
Finding Spatial Patterns in Network Data
Data on modern networks are massive and are applied in the area of monitoring and analyzing activities at the network element, network-wide, and customer and service levels for a h...
Roland Heilmann, Daniel A. Keim, Christian Panse, ...