Denial of service (DoS) attacks are one of the complex problems in the current Internet. In this paper, we propose a system, DoSTRACK, that can efficiently deal withthe TCP SYN and reflection Distributed Denial of Se...
详细信息
ISBN:
(纸本)9781605581668
Denial of service (DoS) attacks are one of the complex problems in the current Internet. In this paper, we propose a system, DoSTRACK, that can efficiently deal withthe TCP SYN and reflection Distributed Denial of Service (DDoS) attacks. We also describe a prototype implementation of our model with HP OpenView Network Node Manager (NNM) and discuss how our model can be beneficial to the DDoS victim and the ISP. Copyright 2009 acm.
the proceedings contain 449 papers. the topics discussed include: text versus non-text distinction in online handwritten documents;enhancing document structure analysis using visual analytics;an automatic linking serv...
ISBN:
(纸本)9781605586380
the proceedings contain 449 papers. the topics discussed include: text versus non-text distinction in online handwritten documents;enhancing document structure analysis using visual analytics;an automatic linking service of document images reducing the effects of OCR errors with latent semantics;standardized interoperable image retrieval;RecoMap: an interactive and adaptive map-based recommender;convex onion peeling genetic algorithm: an efficient solution to map labeling of point-feature;modeling cardinal directions in the 3D space withthe objects interaction cube matrix;a wavelet-based sampling algorithm for wireless sensor networks applications;data stream anomaly detection through principal subspace tracking;a fast approximation strategy for summarizing a set of streaming time series;and online mining of temporal maximal utility itemsets from data streams.
In ontology-based applications, the authoring of complex concepts or queries written in a description logic (DL) is a difficult task. An established approach to generate complex expressions from examples provided a us...
详细信息
the current Virtual Machine (VM) live migration research mainly focuses on transferring run-time memory state of VMs, but neglects the consistency of the network state while migration. this paper designs an Efficient ...
详细信息
the proceedings contain 255 papers. the topics discussed include: coordination of marine multi robot systems with communication constraints;detection of war-caused agricultural field damages using sentinel-2 satellite...
ISBN:
(纸本)9798400702433
the proceedings contain 255 papers. the topics discussed include: coordination of marine multi robot systems with communication constraints;detection of war-caused agricultural field damages using sentinel-2 satellite data with machine learning and anomaly detection;real-time 3D registration and fusion with SRAM-based analog in-memory computing;enhancing safety in cyber-physical systems through runtime enforcement;least privilege persistent-storage access in web browsers;rescuing QUIC flows from countermeasures against UDP flooding attacks;avoiding empty instances and offset drifts of basic sequencer tasks in automotive operating system;trustful coopetitive infrastructures for the new space exploration era;knowledge base grounded pre-trained language models via distillation;and CoSMo: a multilingual modular language for content selection modelling.
the proceedings contain 34 papers. the topics discussed include: exploring approximate computing and near-threshold operation to design energy-efficient multipliers;accuracy and size trade-off of a cartesian genetic p...
ISBN:
(纸本)9781665421706
the proceedings contain 34 papers. the topics discussed include: exploring approximate computing and near-threshold operation to design energy-efficient multipliers;accuracy and size trade-off of a cartesian genetic programming flow for logic optimization;injection-locked ring oscillator based phase-locked-loop for 1.6 Gbps clock recovery;high-performance design for the AV1 multi-alphabet arithmetic decoder;exploring constant signal propagation to optimize neural network circuits;a latching current limiter with telemetries for space applications;and configurable approximate hardware accelerator to compute SATD and SAD metrics for low power all-intra high efficiency video coding.
Shared tuple spaces serve as coordination medium for independent processes to exchange data and messages in a flexible way. If communication takes place over the Internet, security becomes an important issue. It must ...
详细信息
We propose a new cross-training based learning algorithm in this paper. this algorithm generates three classifiers based on the three subsets of original labeled and unlabeled training set. the proposed algorithm is e...
详细信息
ISBN:
(纸本)9781605581668
We propose a new cross-training based learning algorithm in this paper. this algorithm generates three classifiers based on the three subsets of original labeled and unlabeled training set. the proposed algorithm is evaluated using data from the UCI repository by the experiment. Experimental results show that our algorithm can improve classification accuracy compared to those of other algorithms. Copyright 2009 acm.
It is well understood that a conflict between functionality and confidentiality exists within the context of medical research databases: while patients' rights must be preserved, restricting access to data can red...
详细信息
ISBN:
(纸本)9781581139648
It is well understood that a conflict between functionality and confidentiality exists within the context of medical research databases: while patients' rights must be preserved, restricting access to data can reduce the value of the data that is available to the researcher. As such, limiting access so that confidentiality is preserved without reducing functionality more than is necessary should be a key aim of every designer of medical research databases. In this paper we investigate the application of query modification for the protection of sensitive patient data with a view to preserving functionality as much as possible. the work has been conducted within the context of the e-DiaMoND research project. Copyright 2005 acm.
To provide data consistency in the presence of failures and concurrency, database methods will continue to be important to the processing of shared information in a mobile computing environment. Motivated by the need ...
详细信息
ISBN:
(纸本)1581130864
To provide data consistency in the presence of failures and concurrency, database methods will continue to be important to the processing of shared information in a mobile computing environment. Motivated by the need to migrate existing database applications while supporting the development of new database applications and personal services involving mobile and wireless data access, we have developed PRO-MOTION. PRO-MOTION is a mobile transaction processing system that supports disconnected transaction processing in a mobile client-server environment. In this paper, we present the specifics of the structuring and the management of transactions in PRO-MOTION, which utilizes nested-split transactions to provide different levels of isolation and transaction consistency.
暂无评论