Sciweavers

1554 search results - page 234 / 311
» Testing Polymorphic Behavior
Sort
View
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
14 years 1 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo
INFOCOM
2005
IEEE
14 years 1 months ago
Spatial-temporal analysis of passive TCP measurements
— In this paper we look at TCP data which was passively collected from an edge ISP, and analyze it to obtain some new results and deeper understanding of TCP loss process. The fo...
Eli Brosh, G. Lubetzky-Sharon, Yuval Shavitt
INFOCOM
2005
IEEE
14 years 1 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
ACMSE
2005
ACM
14 years 1 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
19
Voted
APGV
2005
ACM
107views Visualization» more  APGV 2005»
14 years 1 months ago
A multiresolution color model for visual difference prediction
How different are two images when viewed by a human observer? Such knowledge is needed in many situations including when one has to judge the degree to which a graphics representa...
David J. Tolhurst, Caterina Ripamonti, C. Alejandr...