Sciweavers

802 search results - page 108 / 161
» Skill Characterization Based on Betweenness
Sort
View
BROADNETS
2007
IEEE
14 years 2 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
DASFAA
2007
IEEE
178views Database» more  DASFAA 2007»
14 years 2 months ago
ClusterSheddy : Load Shedding Using Moving Clusters over Spatio-temporal Data Streams
Abstract. Moving object environments are characterized by large numbers of objects continuously sending location updates. At times, data arrival rates may spike up, causing the loa...
Rimma V. Nehme, Elke A. Rundensteiner
GLOBECOM
2007
IEEE
14 years 2 months ago
The Impacts of Radio Channels and Node Mobility on Link Statistics in Mobile Ad Hoc Networks
Abstract— Understanding link statistics in mobile ad hoc networks (MANETs) is essential to design adaptive routing protocols and achieve desired network performance. While much a...
Ming Zhao 0001, Wenye Wang
HICSS
2007
IEEE
159views Biometrics» more  HICSS 2007»
14 years 2 months ago
Patch Review Processes in Open Source Software Development Communities: A Comparative Case Study
In spite of the overwhelming success of Free/Open Source Software (F/OSS) like Apache and GNU/Linux, there is a limited understanding of the processes and methodologies that speci...
Jai Asundi, Rajiv Jayant
ICC
2007
IEEE
14 years 2 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha