Sciweavers

107 search results - page 18 / 22
» Visual Correlation of Host Processes and Network Traffic
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
ICASSP
2009
IEEE
14 years 2 months ago
Audio-assisted trajectory estimation in non-overlapping multi-camera networks
We present an algorithm to improve trajectory estimation in networks of non-overlapping cameras using audio measurements. The algorithm fuses audiovisual cues in each camera’s ï...
Murtaza Taj, Andrea Cavallaro
MOBIHOC
2006
ACM
14 years 7 months ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
MASCOTS
2008
13 years 9 months ago
Tackling the Memory Balancing Problem for Large-Scale Network Simulation
A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem where a memory-overloaded machine can slow down an entire simulation due to disk ...
Hyojeong Kim, Kihong Park
ICASSP
2009
IEEE
13 years 5 months ago
A reduced-reference video structural similarity metric based on no-reference estimation of channel-induced distortion
The reduced-reference (RR) approximation of a full-reference (FR) video quality assessment method is a convenient way to build evaluation metrics which are both intrinsically well...
Andrea Albonico, Giuseppe Valenzise, Matteo Naccar...