Sciweavers

1517 search results - page 169 / 304
» Hardening Functions for Large Scale Distributed Computations
Sort
View
CLOR
2006
15 years 8 months ago
Comparison of Generative and Discriminative Techniques for Object Detection and Classification
Many approaches to object recognition are founded on probability theory, and can be broadly characterized as either generative or discriminative according to whether or not the dis...
Ilkay Ulusoy, Christopher M. Bishop
FTDCS
2004
IEEE
15 years 8 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow
ICPP
2006
IEEE
15 years 10 months ago
Adaptively Routing P2P Queries Using Association Analysis
Unstructured peer-to-peer networks have become a very popular method for content distribution in the past few years. By not enforcing strict rules on the network’s topology or c...
Brian D. Connelly, Christopher W. Bowron, Li Xiao,...
CISS
2008
IEEE
15 years 4 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett
IPPS
2010
IEEE
15 years 2 months ago
DEBAR: A scalable high-performance de-duplication storage system for backup and archiving
We present DEBAR, a scalable and high-performance de-duplication storage system for backup and archiving, to overcome the throughput and scalability limitations of the state-of-th...
Tianming Yang, Hong Jiang, Dan Feng, Zhongying Niu...