The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
We compare the performance of five well-known truncation heuristics for mitigating the effects of initialization bias in the output analysis of steady-state simulations. Two of th...
K. Preston White, Michael J. Cobb, Stephen C. Spra...
A real-time AI system in the real world needs to monitor an immense volume of data. To do this, the system must filter out much of the incoming data. However, it must remain re ...
A new class of data structures called "bumptrees" is described. These structures are useful for efficiently implementing a number of neural network related operations. A...
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...