Sciweavers

1244 search results - page 168 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
15 years 9 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
CVPR
2005
IEEE
15 years 10 months ago
The Distinctiveness, Detectability, and Robustness of Local Image Features
We introduce a new method that characterizes typical local image features (e.g., SIFT [9], phase feature [3]) in terms of their distinctiveness, detectability, and robustness to i...
Gustavo Carneiro, Allan D. Jepson
HOTOS
1999
IEEE
15 years 9 months ago
An End-System Architecture for Unified Congestion Management
In this position paper we motivate and describe the Congestion Manager (CM), a novel end-system architecture, which enables application adaptation to network congestion. The CM ma...
Hariharan Shankar Rahul, Hari Balakrishnan, Sriniv...
171
Voted
SIGCOMM
2012
ACM
13 years 7 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
CIKM
2010
Springer
15 years 3 months ago
Building recommendation systems using peer-to-peer shared content
Peer-to-Peer (p2p) networks are used for sharing content by millions of users. Often, meta-data used for searching is missing or wrong, making it difficult for users to find cont...
Yuval Shavitt, Ela Weinsberg, Udi Weinsberg