Sciweavers

1804 search results - page 360 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
NETGAMES
2006
ACM
14 years 2 months ago
Authority assignment in distributed multi-player proxy-based games
We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online gam...
Sudhir Aggarwal, Justin Christofoli, Sarit Mukherj...
ICNP
2000
IEEE
14 years 1 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
DOCENG
2006
ACM
14 years 2 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
14 years 1 months ago
An error-correcting unordered code and hardware support for robust asynchronous global communication
A new delay-insensitive data encoding scheme for global asynchronous communication is introduced. The goal of this work is to combine the timing-robustness of delay-insensitive (i....
Melinda Y. Agyekum, Steven M. Nowick
BMCBI
2008
154views more  BMCBI 2008»
13 years 8 months ago
Bayesian models and meta analysis for multiple tissue gene expression data following corticosteroid administration
Background: This paper addresses key biological problems and statistical issues in the analysis of large gene expression data sets that describe systemic temporal response cascade...
Yulan Liang, Arpad Kelemen