Sciweavers

2236 search results - page 308 / 448
» Intrusion detection techniques and approaches
Sort
View
INFOCOM
2005
IEEE
14 years 4 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
ISPA
2004
Springer
14 years 3 months ago
Towards Correct Distributed Simulation of High-Level Petri Nets with Fine-Grained Partitioning
Abstract. Powerful grid and cluster computers allow efficient distributed simulation. Optimistic simulation techniques have been developed which allow for more parallelism in the l...
Michael Knoke, Felix Kühling, Armin Zimmerman...
KDD
2001
ACM
222views Data Mining» more  KDD 2001»
14 years 2 months ago
The PERSEUS Project: Creating Personalized Multimedia News Portal
This paper describes the Perseus project, which is devoted to developing techniques and tools for creating personalized multimedia news portals. The purpose of a personalized mult...
Victor Kulesh, Valery A. Petrushin, Ishwar K. Seth...
SC
2000
ACM
14 years 2 months ago
Dynamic Software Testing of MPI Applications with Umpire
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for managing coarse-grained concurrency on distributed com...
Jeffrey S. Vetter, Bronis R. de Supinski
VISUALIZATION
1998
IEEE
14 years 2 months ago
Selective visualization of vortices in hydrodynamic flows
Vortices are important features in many research and engineering fields. Visualization is an important step in gaining more understanding and control of vortices. Vortex detection...
I. Ari Sadarjoen, Frits H. Post, Bing Ma, David C....