Sciweavers

650 search results - page 112 / 130
» New Approach for Cellular Network Improvement
Sort
View
SIGCOMM
2009
ACM
14 years 4 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ISBI
2008
IEEE
14 years 10 months ago
Sift-based sequence registration and flow-based cortical vessel segmentation applied to high resolution optical imaging data
Several functional and biomedical imaging techniques rely on determining hemodynamic variables and their changes in large vascular networks. To do so at micro-vascular resolution ...
Ivo Vanzetta, Mickaël Péchaud, Renaud ...
PERCOM
2007
ACM
14 years 9 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
AINA
2009
IEEE
14 years 4 months ago
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems
Abstract—The Reliable Server Pooling (RSerPool) architecture is the IETF’s new standard for a lightweight server redundancy and session failover framework to support availabili...
Xing Zhou, Thomas Dreibholz, Fu Fa, Wencai Du, Erw...
ASIAMS
2008
IEEE
14 years 4 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...