Sciweavers

1816 search results - page 152 / 364
» Trace oblivious computation
Sort
View
WWW
2007
ACM
14 years 11 months ago
Identifying and discriminating between web and peer-to-peer traffic in the network core
Traffic classification is the ability to identify and categorize network traffic by application type. In this paper, we consider the problem of traffic classification in the netwo...
Jeffrey Erman, Anirban Mahanti, Martin F. Arlitt, ...
MOBIHOC
2003
ACM
14 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
CVPR
2010
IEEE
14 years 6 months ago
Boundary Learning by Optimization with Topological Constraints
Recent studies have shown that machine learning can improve the accuracy of detecting object boundaries in images. In the standard approach, a boundary detector is trained by mini...
Viren Jain, Benjamin Bollmann, Bobby Kasthuri, Ken...
RAID
2009
Springer
14 years 4 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
ICPADS
2008
IEEE
14 years 4 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi