Sciweavers

1551 search results - page 191 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ICPR
2008
IEEE
14 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
IEEEIAS
2008
IEEE
14 years 4 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
IPPS
2007
IEEE
14 years 4 months ago
Biomolecular Path Sampling Enabled by Processing in Network Storage
Computationally complex and data intensive atomic scale biomolecular simulation is enabled via Processing in Network Storage (PINS): a novel distributed system framework to overco...
Paul Brenner, Justin M. Wozniak, Douglas Thain, Aa...
ICDE
2006
IEEE
143views Database» more  ICDE 2006»
14 years 4 months ago
Application-aware Overlay Networks for Data Dissemination
XPORT (eXtensible Profile-driven Overlay Routing Trees) is a generic data dissemination system that supports an extensible set of data types and profiles, and an optimization fr...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...
IPPS
2005
IEEE
14 years 3 months ago
Modeling and Taming Parallel TCP on the Wide Area Network
— Parallel TCP flows are broadly used in the high performance distributed computing community to enhance network throughput, particularly for large data transfers. Previous rese...
Dong Lu, Yi Qiao, Peter A. Dinda, Fabián E....