Sciweavers

324 search results - page 51 / 65
» Integrating heterogeneous network monitoring data
Sort
View
DIMVA
2008
13 years 9 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
IWCMC
2010
ACM
14 years 19 days ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
VTC
2007
IEEE
162views Communications» more  VTC 2007»
14 years 1 months ago
Improving Vertical Handover Performance with PHY-Mode Recommendations Based on Localized Link State Measurements
— Cooperation amongst heterogeneous mobile radio systems will be an indispensable feature of ‘beyond 3G’. One key mechanism thereby serving as enabling technique for system i...
Daniel Bültmann, Matthias Siebert, Jijun Luo
I3
2007
13 years 9 months ago
OKKAM: Enabling a Web of Entities
Already in the early 14th century, the philosopher William of Ockham created the philosophical principle known as Ockham’s Razor, which can be translated from Latin as ”entiti...
Paolo Bouquet, Heiko Stoermer, Daniel Giacomuzzi
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
14 years 9 months ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...