408,722 Hits in 3.6 sec

DATA - Differential Address Trace Analysis

Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl
2018 Krypto-Tag  
More precisely, DATA is a differential address trace analysis framework that reveals address-based side-channel leaks in program binaries.  ...  The detection of address-based side-channel leaks works in three phases. First, the program under test is executed to record several address traces.  ... 
doi:10.18420/cdm-2018-28-14 dblp:conf/kryptotag/WeiserZSMMS18 fatcat:wem2v7jr65byvjzc7soj4ketmy

Identifying traffic differentiation on cellular data networks

Arash Molavi Kakhki, Abbas Razaghpanah, Rajesh Golani, David Choffnes, Phillipa Gill, Alan Mislove
2014 Proceedings of the 2014 ACM conference on SIGCOMM - SIGCOMM '14  
For example, if we use EC2 servers and the tested app streams video from a server in the same data center (and/or same block of IP addresses), we may be able to trigger the same differentiation in our  ...  INTRODUCTION The goal of this research is to detect traffic differentiation in cellular data networks.  ... 
doi:10.1145/2619239.2631445 dblp:conf/sigcomm/KakhkiRGCGM14 fatcat:mpvq4egjavd7bahujoxir7e7gi

Identifying traffic differentiation on cellular data networks

Arash Molavi Kakhki, Abbas Razaghpanah, Rajesh Golani, David Choffnes, Phillipa Gill, Alan Mislove
2014 Computer communication review  
For example, if we use EC2 servers and the tested app streams video from a server in the same data center (and/or same block of IP addresses), we may be able to trigger the same differentiation in our  ...  INTRODUCTION The goal of this research is to detect traffic differentiation in cellular data networks.  ... 
doi:10.1145/2740070.2631445 fatcat:oo2uwwfasvhzbjnjbsdc66cicq

Application of Data Compression to the MIL-STD-1553 Data Bus

Russell W. Duren, Michael W. Thompson
2008 IEEE Aerospace Conference. Proceedings  
This paper examines multiple data compression algorithms that improve the effective bandwidth of systems using the MIL-STD-1553 data bus.  ...  It is demonstrated that the time required to compress and decompress the data can be more than offset by the savings in data transmission time.  ...  For this reason, we excluded start-up conditions from the analysis for the differential technique.  ... 
doi:10.1109/aero.2008.4526551 fatcat:hq6qfxi3ibf3xmk26fwubngqsq

Integrating heterogeneous network monitoring data

Chi Zhang, Bin Liu, Xun Su, Heidi Alvarez, Julio Ibarra
2008 Telecommunications Systems  
To integrate heterogeneous monitoring data, we first synchronize their timestamps, and then match their masked IP addresses.  ...  Our key observation is that although the IP addresses are masked, some other header fields can be exploited to match different types of monitoring data.  ...  We've also considered anonymized IP addresses. Traffic analysis based-on packet-level traces is also an important direction.  ... 
doi:10.1007/s11235-008-9073-5 fatcat:p4k33ffeajfbzgef7r2mfhh72q

Evaluating Visual Data Analysis Systems

Leilani Battle, Marco Angelini, Carsten Binnig, Tiziana Catarci, Philipp Eichmann, Jean-Daniel Fekete, Giuseppe Santucci, Michael Sedlmair, Wesley Willett
2018 Proceedings of the Workshop on Human-In-the-Loop Data Analytics - HILDA'18  
Visual data analysis is a key tool for helping people to make sense of and interact with massive data sets.  ...  In this paper, we report on the discussions of the working group on the evaluation of visual data systems, which addressed questions centered around developing better evaluation methods, such as "How do  ...  Conceptually we differentiate between traces, sessions and experiments (see Figure 2) , each of which is described by a manifest. • Traces may contain log data (including system logs, audio, video, screen  ... 
doi:10.1145/3209900.3209901 dblp:conf/sigmod/BattleABCEFSSW18 fatcat:k57wsmv2pbh53b7ronweskm7ga

Differentiated Replication Strategy in Data Centers [chapter]

Tung Nguyen, Anthony Cutway, Weisong Shi
2010 Lecture Notes in Computer Science  
We envision the provisioning of differentiated services as being one of the key components to the success of cloud computing. Unfortunately, this issue has not been fully addressed in the past.  ...  The experimental results show that this service actually provides different availabilities and execution times for different service types with the same request traces, failure traces, and workload.  ...  Therefore, we propose a new strategy called Differentiated Replication (DiR) to address this problem.  ... 
doi:10.1007/978-3-642-15672-4_24 fatcat:nueoukrzirc7bilensdozimj4q

Differential expression analysis of transcriptome data of Trypanosoma brucei RBP6 induction in procyclics leading to infectious metacyclics and bloodstream forms in vitro

Huafang Shi, Kiantra Butler, Christian Tschudi
2018 Data in Brief  
This data file describes the bioinformatics analysis of 20 distinct RNA-Seq samples, with four biological replicates each, highlighting differential transcript abundance.  ...  Complete raw data files were deposited at the NCBI Sequence Read Archive - SRA at with accession numbers: SRP153824, SRP153562, and SRP152737.  ...  Supporting information Supplementary data associated with this article can be found in the online version at https://doi. org/10.1016/j.dib.2018.08.169.  ... 
doi:10.1016/j.dib.2018.08.169 pmid:30225310 pmcid:PMC6139001 fatcat:vs6d2hhoxjb6fhiugbb556ueju

Third party data gene data set of eutherian growth hormone genes

Marko Premzl
2015 Genomics Data  
The eutherian GH third party data gene data set included genes implicated in major physiological processes [4] [5] [6] [7] [8] [9] [10] .  ...  The present updated gene classification and nomenclature of eutherian GH genes integrated gene annotations, phylogenetic analysis and protein molecular evolution analysis into new framework of future experiments  ...  Of note, the present phylogenetic analysis first included completed eutherian GH gene data set.  ... 
doi:10.1016/j.gdata.2015.09.007 pmid:26697363 pmcid:PMC4664738 fatcat:bryquh65dvf2rgh76xhj6huebu

Data-driven spatial locality

Svetozar Miucin, Alexandra Fedorova
2018 Proceedings of the International Symposium on Memory Systems - MEMSYS '18  
Further, we introduce access graphs, a novel way of representing spatial locality properties of programs which are generated from memory access traces.  ...  This work presents insights and analysis into how experts create performant memory layouts, and proposes new abstractions, algorithms and techniques to automate parts of the process.  ...  To address this gap, we built DINAMITE -a toolkit for Dynamic INstrumentation and Analysis for MassIve Trace Exploration.  ... 
doi:10.1145/3240302.3240417 dblp:conf/memsys/MiucinF18 fatcat:ay76jpnd3jcfzjpqyw42c4vemm

Hardware-based data value and address trace filtering techniques

Vladimir Uzelac, Aleksandar Milenković
2010 Proceedings of the 2010 international conference on Compilers, architectures and synthesis for embedded systems - CASES '10  
data cache size; and ~5 times for the data address trace) at the cost of rather small hardware structures in the trace module.  ...  The results of our experimental analysis indicate that the proposed filtering techniques can significantly reduce the size of the data traces (~5-20 times for the load data value trace, depending on the  ...  Our experimental analysis (Section 3.3) shows that the proposed mechanism offers 5-fold data address trace reduction over the uncompressed address trace.  ... 
doi:10.1145/1878921.1878940 dblp:conf/cases/UzelacM10 fatcat:7g722afhi5halckpwk52xun7ea

Pricing of Data Products in Data Marketplaces [chapter]

Samuel A. Fricker, Yuliyan V. Maksimov
2017 Lecture Notes in Business Information Processing  
While digital markets for trading data are emerging, there is no consolidated understanding of how to price data products and thus offer data vendors incentives for sharing data.  ...  Mobile computing and the Internet of Things promises massive amounts of data for big data analytic and machine learning.  ...  RQ2: How do vendors price data? The pricing of data is the concern being addressed by the presented research.  ... 
doi:10.1007/978-3-319-69191-6_4 fatcat:v4lw7jn6q5bdjmfqmw3na2of3e

Student Food Data Analysis System

Xin-run LI, Jun-yi ZHANG, Yu HUANG, Zi-ling ZENG, Cheng DU
2018 DEStech Transactions on Engineering and Technology Research  
data analysis and delivered to students and parents through the webpage, thus promoting the common development of both students and canteens.  ...  information based on single-chip RFID technology, python data analysis and computer-side information display; Based on the dietary data, the students' nutrition and health information is generated through  ...  The next step is to make different program improvements for different schools across the country, expand the access to data, get more data analysis conclusions, and conduct differential analysis to find  ... 
doi:10.12783/dtetr/ecar2018/26365 fatcat:bwe7aub7ajfglk7hwq6myxpb2y

Fast Anomaly Detection for Large Data Centers

Ang Li, Lin Gu, Kuai Xu
2010 2010 IEEE Global Telecommunications Conference GLOBECOM 2010  
In this paper, we propose to use the distributions of IP address octets and centroid based measures to characterize the inherent IP structure in high-volume data center traffic, and subsequently design  ...  We evaluate the effectiveness and efficiency of this algorithm with synthetic traffic that combines real data center traffic collected from a large Internet content provider with worm traces and denial  ...  ANALYSIS OF TRAFFIC FLOWS In this section, we first analyze the characteristics of IP addresses in packet traces obtained from several data centers, which forms a solid basis for developing the centroid  ... 
doi:10.1109/glocom.2010.5683551 dblp:conf/globecom/LiGX10 fatcat:aba544gvqzcd5j7fkxdtywlgmy

Explaining outputs in modern data analytics

Zaheer Chothia, John Liagouris, Frank McSherry, Timothy Roscoe
2016 Proceedings of the VLDB Endowment  
We add a small (but extensible) set of rules to explain each of its data-parallel operators, and we implement these rules as differential dataflow operators themselves.  ...  To produce explanations, existing works adopt a naive backward tracing approach which runs into known issues; naive backward tracing may identify: (i) too much information that is difficult to process,  ...  Backward Tracing in Differential Dataflow Besides the general map and reduce operators, differential dataflow also introduces a data-parallel join and an iterate operator.  ... 
doi:10.14778/2994509.2994530 fatcat:ummh2n3gyjby5fjnjutcepdqmy
« Previous Showing results 1 — 15 out of 408,722 results