Sciweavers

87 search results - page 8 / 18
» The Use of Honeynets to Detect Exploited Systems Across Larg...
Sort
View
AP2PS
2009
IEEE
14 years 2 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
SEMWEB
2004
Springer
14 years 29 days ago
Bibster - A Semantics-Based Bibliographic Peer-to-Peer System
Abstract. This paper describes the design and implementation of Bibster, a Peer-to-Peer system for exchanging bibliographic data among researchers. Bibster exploits ontologies in d...
Peter Haase, Jeen Broekstra, Marc Ehrig, Maarten M...
AIRWEB
2007
Springer
14 years 1 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 1 months ago
A Framework for Optimizing the Uplink Performance of Distributed Antenna Systems under a Constrained Backhaul
Abstract— It has recently been shown that multi-cell cooperations in cellular networks, enabling distributed antenna systems and joint transmission or joint detection across cell...
Patrick Marsch, Gerhard Fettweis
IWCC
1999
IEEE
13 years 12 months ago
Nomad: A Scalable Operating System for Clusters of Uni and Multiprocessors
The recent improvements in workstation and interconnection network performance have popularized the clusters of off-the-shelf workstations. However, the usefulness of these cluste...
Eduardo Pinheiro, Ricardo Bianchini