Sciweavers

47 search results - page 6 / 10
» saint 2008
Sort
View
SAINT
2008
IEEE
14 years 1 months ago
ROOK: Multi-session Based Network Security Event Detector
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Masayoshi Mizutani, Shin Shirahata, Masaki Minami,...
SAINT
2008
IEEE
14 years 1 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
SAINT
2008
IEEE
14 years 1 months ago
Analysis of a Self-Organizing Maintenance Algorithm under Constant Churn
An increasing proportion of distributed hash tables (DHTs) maintain additional routing information regarding each node’s immediately surrounding neighbors in a network overlay. ...
Richard Price, Tien Tuan Anh Dinh, Georgios K. The...
SAINT
2008
IEEE
14 years 1 months ago
Detection of Pedestrians Using Subtraction Stereo
Abstract— In this paper, detection of pedestrians using “subtraction stereo” is discussed. Subtraction stereo is a stereo vision method that focuses on the movement of object...
Yuki Hashimoto, Yusuke Matsuki, Tatsuya Nakanishi,...
LREC
2008
101views Education» more  LREC 2008»
13 years 9 months ago
Investigating the Structure of Procedural Texts for Answering How-to Questions
This paper presents ongoing work dedicated to parsing the textual structure of procedural texts. We propose here a model for the intructional structure and criteria to identify it...
Estelle Delpech, Patrick Saint-Dizier