Sciweavers

426 search results - page 60 / 86
» Procedures and tools for analysis of network traffic measure...
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
13 years 2 months ago
Formal analysis of piecewise affine systems through formula-guided refinement
Abstract-- We present a computational framework for identifying a set of initial states from which all trajectories of a piecewise affine (PWA) system satisfy a Linear Temporal Log...
Boyan Yordanov, Jana Tumova, Calin Belta, Ivana Ce...
SENSYS
2005
ACM
14 years 1 months ago
Packet combining in sensor networks
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions o...
Henri Dubois-Ferrière, Deborah Estrin, Mart...
WILF
2005
Springer
112views Fuzzy Logic» more  WILF 2005»
14 years 1 months ago
NEC for Gene Expression Analysis
Aim of this work is to apply a novel comprehensive machine learning tool for data mining to preprocessing and interpretation of gene expression data. Furthermore, some visualizatio...
Roberto Amato, Angelo Ciaramella, N. Deniskina, Ca...
CCS
2010
ACM
13 years 7 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler