Sciweavers

708 search results - page 138 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 7 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
ICPPW
2002
IEEE
14 years 12 days ago
MigThread: Thread Migration in DSM Systems
Distributed Shared Memory (DSM) systems provide a logically shared memory over physically distributed memory to enable parallel computation on Networks of Workstations (NOWs). In ...
Hai Jiang, Vipin Chaudhary
EWSN
2010
Springer
13 years 10 months ago
Mitigating the Effects of RF Interference through RSSI-Based Error Recovery
On a common sensor node platform (Telos) we sample RSSI with high frequency during packet reception. We find that a packet collision (RF interference) often manifests as a measurab...
Jan-Hinrich Hauer, Andreas Willig, Adam Wolisz
CNIS
2006
13 years 8 months ago
An efficient hybrid algorithm for multidimensional packet classification
Multidimensional Packet Classification is one of the most critical functions for network security devices such as firewalls and intrusion detection systems. Due to the worst case ...
Yaxuan Qi, Jun Li
CNIS
2006
13 years 8 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li