Sciweavers

141 search results - page 21 / 29
» Observing and probing
Sort
View
IMC
2003
ACM
14 years 22 days ago
Simple network performance tomography
In network performance tomography, characteristics of the network interior are inferred by correlating end-to-end measurements. In much previous work, the presence of correlations...
Nick G. Duffield
ICNP
1998
IEEE
13 years 11 months ago
A Class of End-to-End Congestion Control Algorithms for the Internet
We formulate end-to-end congestion control as a global optimization problem. Based on this formulation, a class of minimum cost flow control (MCFC) algorithms for adjusting sessio...
S. Jamaloddin Golestani, S. Bhattacharyya
FGR
2006
IEEE
169views Biometrics» more  FGR 2006»
13 years 11 months ago
Local Linear Regression (LLR) for Pose Invariant Face Recognition
The variation of facial appearance due to the viewpoint (/pose) degrades face recognition systems considerably, which is well known as one of the bottlenecks in face recognition. ...
Xiujuan Chai, Shiguang Shan, Xilin Chen, Wen Gao
IMC
2007
ACM
13 years 9 months ago
A brief history of scanning
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity obse...
Mark Allman, Vern Paxson, Jeff Terrell
PST
2004
13 years 8 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani