Sciweavers

1583 search results - page 210 / 317
» Issues in data stream management
Sort
View
IMC
2006
ACM
14 years 4 months ago
binpac: a yacc for writing application protocol parsers
A key step in the semantic analysis of network traffic is to parse the traffic stream according to the high-level protocols it contains. This process transforms raw bytes into s...
Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. ...
ICRA
2002
IEEE
166views Robotics» more  ICRA 2002»
14 years 3 months ago
Real Time Visualization of Robot State with Mobile Virtual Reality
— With the deployment of large, distributed networks of cameras and other sensors, it is becoming necessary to also address the issue of how to effectively present the large vol...
Peter Amstutz, Andrew H. Fagg
ICIP
1994
IEEE
15 years 10 days ago
Robust Optical Flow Estimation
Motion information is essential in many computer vision and video analysis tasks. Since MPEG is still one of the most prevalent formats for representing, transferring and storing ...
Sugata Ghosal, Rajiv Mehrotra
ICISS
2009
Springer
14 years 5 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
RAID
2007
Springer
14 years 5 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...