Sciweavers

2340 search results - page 394 / 468
» Second quarter 2008
Sort
View
CCR
2004
95views more  CCR 2004»
13 years 10 months ago
A Per-Domain Behavior for circuit emulation in IP networks
Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of...
Kathleen M. Nichols, Van Jacobson, Kedarnath Podur...
CI
2004
119views more  CI 2004»
13 years 10 months ago
Reasoning with Sets of Defaults in Default Logic
We present a general approach for representing and reasoning with sets of defaults in default logic, focussing on reasoning about preferences among sets of defaults. First, we con...
James P. Delgrande, Torsten Schaub
CN
2004
129views more  CN 2004»
13 years 10 months ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
CN
2004
95views more  CN 2004»
13 years 10 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
COMCOM
2004
148views more  COMCOM 2004»
13 years 10 months ago
Hierarchical analysis of RealMedia streaming traffic on an IEEE 802.11b wireless LAN
The popularity of multimedia streaming on the Internet, combined with the growing deployment of wireless access networks, augurs the converging usage of these two technologies in ...
Tianbo Kuang, Carey L. Williamson