Sciweavers

1551 search results - page 248 / 311
» Privacy-Preserving Network Aggregation
Sort
View
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
13 years 10 months ago
Patterns of Cascading Behavior in Large Blog Graphs
How do blogs cite and influence each other? How do such links evolve? Does the popularity of old blog posts drop exponentially with time? These are some of the questions that we ...
Jure Leskovec, Mary McGlohon, Christos Faloutsos, ...
DIMVA
2004
13 years 10 months ago
Alarm Reduction and Correlation in Intrusion Detection Systems
: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliability by redundancy and tolerance are an imperative for such dependable networks. In order...
Tobias Chyssler, Stefan Burschka, Michael Semling,...
ISCAPDCS
2003
13 years 10 months ago
A Super-Peer Based Lookup in Structured Peer-to-Peer Systems
All existing lookup algorithms in structured peerto-peer (P2P) systems assume that all peers are uniform in resources (e.g., network bandwidth, storage and CPU). Messages are rout...
Yingwu Zhu, Honghao Wang, Yiming Hu
CN
2008
280views more  CN 2008»
13 years 9 months ago
Joint transmit power and physical carrier sensing adaptation based on loss differentiation for high density IEEE 802.11 WLAN
In high density (HD) IEEE 802.11 WLAN, packet loss can occur due to co-channel interference (asynchronous interference) or collisions (synchronous interference). In order to effec...
Hui Ma, Jing Zhu, Sumit Roy, Soo Young Shin
JNSM
2008
93views more  JNSM 2008»
13 years 8 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia