Sciweavers

551 search results - page 92 / 111
» Probing TCP Implementations
Sort
View
FIMI
2003
95views Data Mining» more  FIMI 2003»
13 years 9 months ago
Probabilistic Iterative Expansion of Candidates in Mining Frequent Itemsets
A simple new algorithm is suggested for frequent itemset mining, using item probabilities as the basis for generating candidates. The method first finds all the frequent items, an...
Attila Gyenesei, Jukka Teuhola
LISA
2001
13 years 9 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
ENVSOFT
2008
120views more  ENVSOFT 2008»
13 years 8 months ago
Extension and evaluation of sensitivity analysis capabilities in a photochemical model
The decoupled direct method in three dimensions (DDM-3D) provides an efficient and accurate approach for probing the sensitivity of atmospheric pollutant concentrations to various...
S. L. Napelenok, D. S. Cohan, M. T. Odman, S. Tons...
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 8 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CGF
2005
111views more  CGF 2005»
13 years 8 months ago
Temporally Coherent Irradiance Caching for High Quality Animation Rendering
In rendering of high quality animations that include global illumination, the final gathering and irradiance caching are considered standard procedures. However, the computational...
Miloslaw Smyk, Shin-ichi Kinuwaki, Roman Durikovic...