A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
DATA - Differential Address Trace Analysis
2018
Krypto-Tag
More precisely, DATA is a differential address trace analysis framework that reveals address-based side-channel leaks in program binaries. ...
The detection of address-based side-channel leaks works in three phases. First, the program under test is executed to record several address traces. ...
doi:10.18420/cdm-2018-28-14
dblp:conf/kryptotag/WeiserZSMMS18
fatcat:wem2v7jr65byvjzc7soj4ketmy
Identifying traffic differentiation on cellular data networks
2014
Proceedings of the 2014 ACM conference on SIGCOMM - SIGCOMM '14
For example, if we use EC2 servers and the tested app streams video from a server in the same data center (and/or same block of IP addresses), we may be able to trigger the same differentiation in our ...
INTRODUCTION The goal of this research is to detect traffic differentiation in cellular data networks. ...
doi:10.1145/2619239.2631445
dblp:conf/sigcomm/KakhkiRGCGM14
fatcat:mpvq4egjavd7bahujoxir7e7gi
Identifying traffic differentiation on cellular data networks
2014
Computer communication review
For example, if we use EC2 servers and the tested app streams video from a server in the same data center (and/or same block of IP addresses), we may be able to trigger the same differentiation in our ...
INTRODUCTION The goal of this research is to detect traffic differentiation in cellular data networks. ...
doi:10.1145/2740070.2631445
fatcat:oo2uwwfasvhzbjnjbsdc66cicq
Application of Data Compression to the MIL-STD-1553 Data Bus
2008
IEEE Aerospace Conference. Proceedings
This paper examines multiple data compression algorithms that improve the effective bandwidth of systems using the MIL-STD-1553 data bus. ...
It is demonstrated that the time required to compress and decompress the data can be more than offset by the savings in data transmission time. ...
For this reason, we excluded start-up conditions from the analysis for the differential technique. ...
doi:10.1109/aero.2008.4526551
fatcat:hq6qfxi3ibf3xmk26fwubngqsq
Integrating heterogeneous network monitoring data
2008
Telecommunications Systems
To integrate heterogeneous monitoring data, we first synchronize their timestamps, and then match their masked IP addresses. ...
Our key observation is that although the IP addresses are masked, some other header fields can be exploited to match different types of monitoring data. ...
We've also considered anonymized IP addresses. Traffic analysis based-on packet-level traces is also an important direction. ...
doi:10.1007/s11235-008-9073-5
fatcat:p4k33ffeajfbzgef7r2mfhh72q
Evaluating Visual Data Analysis Systems
2018
Proceedings of the Workshop on Human-In-the-Loop Data Analytics - HILDA'18
Visual data analysis is a key tool for helping people to make sense of and interact with massive data sets. ...
In this paper, we report on the discussions of the working group on the evaluation of visual data systems, which addressed questions centered around developing better evaluation methods, such as "How do ...
Conceptually we differentiate between traces, sessions and experiments (see Figure 2) , each of which is described by a manifest. • Traces may contain log data (including system logs, audio, video, screen ...
doi:10.1145/3209900.3209901
dblp:conf/sigmod/BattleABCEFSSW18
fatcat:k57wsmv2pbh53b7ronweskm7ga
Differentiated Replication Strategy in Data Centers
[chapter]
2010
Lecture Notes in Computer Science
We envision the provisioning of differentiated services as being one of the key components to the success of cloud computing. Unfortunately, this issue has not been fully addressed in the past. ...
The experimental results show that this service actually provides different availabilities and execution times for different service types with the same request traces, failure traces, and workload. ...
Therefore, we propose a new strategy called Differentiated Replication (DiR) to address this problem. ...
doi:10.1007/978-3-642-15672-4_24
fatcat:nueoukrzirc7bilensdozimj4q
Differential expression analysis of transcriptome data of Trypanosoma brucei RBP6 induction in procyclics leading to infectious metacyclics and bloodstream forms in vitro
2018
Data in Brief
This data file describes the bioinformatics analysis of 20 distinct RNA-Seq samples, with four biological replicates each, highlighting differential transcript abundance. ...
Complete raw data files were deposited at the NCBI Sequence Read Archive - SRA at http://www.ncbi.nlm.nih.gov/Traces/sra/sra.cgi with accession numbers: SRP153824, SRP153562, and SRP152737. ...
Supporting information Supplementary data associated with this article can be found in the online version at https://doi. org/10.1016/j.dib.2018.08.169. ...
doi:10.1016/j.dib.2018.08.169
pmid:30225310
pmcid:PMC6139001
fatcat:vs6d2hhoxjb6fhiugbb556ueju
Third party data gene data set of eutherian growth hormone genes
2015
Genomics Data
The eutherian GH third party data gene data set included genes implicated in major physiological processes [4] [5] [6] [7] [8] [9] [10] . ...
The present updated gene classification and nomenclature of eutherian GH genes integrated gene annotations, phylogenetic analysis and protein molecular evolution analysis into new framework of future experiments ...
Of note, the present phylogenetic analysis first included completed eutherian GH gene data set. ...
doi:10.1016/j.gdata.2015.09.007
pmid:26697363
pmcid:PMC4664738
fatcat:bryquh65dvf2rgh76xhj6huebu
Data-driven spatial locality
2018
Proceedings of the International Symposium on Memory Systems - MEMSYS '18
Further, we introduce access graphs, a novel way of representing spatial locality properties of programs which are generated from memory access traces. ...
This work presents insights and analysis into how experts create performant memory layouts, and proposes new abstractions, algorithms and techniques to automate parts of the process. ...
To address this gap, we built DINAMITE -a toolkit for Dynamic INstrumentation and Analysis for MassIve Trace Exploration. ...
doi:10.1145/3240302.3240417
dblp:conf/memsys/MiucinF18
fatcat:ay76jpnd3jcfzjpqyw42c4vemm
Hardware-based data value and address trace filtering techniques
2010
Proceedings of the 2010 international conference on Compilers, architectures and synthesis for embedded systems - CASES '10
data cache size; and ~5 times for the data address trace) at the cost of rather small hardware structures in the trace module. ...
The results of our experimental analysis indicate that the proposed filtering techniques can significantly reduce the size of the data traces (~5-20 times for the load data value trace, depending on the ...
Our experimental analysis (Section 3.3) shows that the proposed mechanism offers 5-fold data address trace reduction over the uncompressed address trace. ...
doi:10.1145/1878921.1878940
dblp:conf/cases/UzelacM10
fatcat:7g722afhi5halckpwk52xun7ea
Pricing of Data Products in Data Marketplaces
[chapter]
2017
Lecture Notes in Business Information Processing
While digital markets for trading data are emerging, there is no consolidated understanding of how to price data products and thus offer data vendors incentives for sharing data. ...
Mobile computing and the Internet of Things promises massive amounts of data for big data analytic and machine learning. ...
RQ2: How do vendors price data? The pricing of data is the concern being addressed by the presented research. ...
doi:10.1007/978-3-319-69191-6_4
fatcat:v4lw7jn6q5bdjmfqmw3na2of3e
Student Food Data Analysis System
2018
DEStech Transactions on Engineering and Technology Research
data analysis and delivered to students and parents through the webpage, thus promoting the common development of both students and canteens. ...
information based on single-chip RFID technology, python data analysis and computer-side information display; Based on the dietary data, the students' nutrition and health information is generated through ...
The next step is to make different program improvements for different schools across the country, expand the access to data, get more data analysis conclusions, and conduct differential analysis to find ...
doi:10.12783/dtetr/ecar2018/26365
fatcat:bwe7aub7ajfglk7hwq6myxpb2y
Fast Anomaly Detection for Large Data Centers
2010
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
In this paper, we propose to use the distributions of IP address octets and centroid based measures to characterize the inherent IP structure in high-volume data center traffic, and subsequently design ...
We evaluate the effectiveness and efficiency of this algorithm with synthetic traffic that combines real data center traffic collected from a large Internet content provider with worm traces and denial ...
ANALYSIS OF TRAFFIC FLOWS In this section, we first analyze the characteristics of IP addresses in packet traces obtained from several data centers, which forms a solid basis for developing the centroid ...
doi:10.1109/glocom.2010.5683551
dblp:conf/globecom/LiGX10
fatcat:aba544gvqzcd5j7fkxdtywlgmy
Explaining outputs in modern data analytics
2016
Proceedings of the VLDB Endowment
We add a small (but extensible) set of rules to explain each of its data-parallel operators, and we implement these rules as differential dataflow operators themselves. ...
To produce explanations, existing works adopt a naive backward tracing approach which runs into known issues; naive backward tracing may identify: (i) too much information that is difficult to process, ...
Backward Tracing in Differential Dataflow Besides the general map and reduce operators, differential dataflow also introduces a data-parallel join and an iterate operator. ...
doi:10.14778/2994509.2994530
fatcat:ummh2n3gyjby5fjnjutcepdqmy
« Previous
Showing results 1 — 15 out of 408,722 results