Sciweavers

1551 search results - page 261 / 311
» Privacy-Preserving Network Aggregation
Sort
View
CNIS
2006
13 years 10 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 10 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
COMAD
2009
13 years 10 months ago
Trust-Based Infinitesimals for Enhanced Collaborative Filtering
In this paper we propose a novel recommender system which enhances user-based collaborative filtering by using a trust-based social network. Our main idea is to use infinitesimal ...
Maria Chowdhury, Alex Thomo, William W. Wadge
EENERGY
2010
13 years 10 months ago
Profiling energy use in households and office spaces
Energy consumption is largely studied in the context of different environments, such as domestic, corporate, industrial, and public sectors. In this paper, we discuss two environm...
Salman Taherian, Marcelo Pias, George Coulouris, J...
CONEXT
2009
ACM
13 years 10 months ago
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments
ThunderDome is a system for collaboratively measuring upload bandwidths in ad-hoc peer-to-peer systems. It works by scheduling bandwidth probes between pairs of hosts, wherein eac...
John R. Douceur, James W. Mickens, Thomas Moscibro...