Sciweavers

10820 search results - page 121 / 2164
» Understanding
Sort
View
131
Voted
IMC
2009
ACM
15 years 9 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
97
Voted
IMC
2009
ACM
15 years 9 months ago
Understanding slow BGP routing table transfers
Researchers and network operators often say that BGP table transfers are slow. Despite this common knowledge, the reasons for slow BGP transfers are not well understood. This pape...
Zied Ben-Houidi, Mickael Meulle, Renata Teixeira
IMC
2009
ACM
15 years 9 months ago
Understanding the efficacy of deployed internet source address validation filtering
Robert Beverly, Arthur Berger, Young Hyun, kc claf...
122
Voted
MM
2009
ACM
156views Multimedia» more  MM 2009»
15 years 9 months ago
Understanding near-duplicate videos: a user-centric approach
Popular content in video sharing web sites (e.g., YouTube) is usually duplicated. Most scholars define near-duplicate video clips (NDVC) based on non-semantic features (e.g., di...
Mauro Cherubini, Rodrigo de Oliveira, Nuria Oliver