Filters








22,555 Hits in 7.1 sec

SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network [chapter]

Yan Chen, Randy H. Katz, John D. Kubiatowicz
2002 Lecture Notes in Computer Science  
od_smart, random SCAN od_naive, backbone SCAN od_smart, backbone SCAN Ú º Ì Ô Ö ÓÖÑ Ò ÓÚ × Ú Ø Ø Ó×Ø Ó ¹ØÖ ÓÒ×ØÖÙ Ø ÓÒ´ ÙÖ µº  ...  Ù× × ÓÒÐÝ ÓÙØ Ö Øµ´ ¼¼ Ë AE × ÖÚ Ö×µ 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 1 2 3 4 5 6 7 Cumulative percentage of source to member pairs RDP od_naive, random SCAN  ... 
doi:10.1007/3-540-45866-2_22 fatcat:jkjzip2ngrabbhuyfo7cejgrdq

Scanning the Issue

Azim Eskandarian
2022 IEEE transactions on intelligent transportation systems (Print)  
The authors take into account the integration of blockchain and federated learning in vehicular networks as a direction for future research.  ...  practical applications, including traffic management, safety, and energy efficiency.  ...  To solve this problem, the authors propose a reliable and efficient content sharing scheme in vehicular networks.  ... 
doi:10.1109/tits.2022.3141513 fatcat:gvywr655cvgolg7rfjrqmt33b4

Scanning the Issue

2019 IEEE Transactions on Automatic Control  
This paper proposes a novel scalable model-based fault detection and isolation approach for the monitoring of nonlinear large-scale systems, consisting of a network of interconnected subsystems and affected  ...  The proposed architecture is distributed and designed to automatically manage the potential plug-in of novel subsystems and unplug of existing ones.  ...  Distributed Balancing of Commodity Networks Under Flow Interval Constraints C. N. Hadjicostis and A. D.  ... 
doi:10.1109/tac.2018.2884271 fatcat:fca4c7pw2jazlnoeisqhucd2oy

Scanning the Issue

Azim Eskandarian
2019 IEEE transactions on intelligent transportation systems (Print)  
Then, both static and dynamic urban features relevant to unmet demand are extracted from data sets in different domains.  ...  Varying weather conditions, including rainfall and snowfall, are generally regarded as a challenge for computer vision algorithms.  ...  Cai An edge computing based relay selection framework is developed to help edge computing devices (ECDs) distribute contents in vehicular networks.  ... 
doi:10.1109/tits.2019.2926819 fatcat:oodbtsyfvjhsbpc2nmbulgeqda

Scanning the Issue

Azim Eskandarian
2020 IEEE transactions on intelligent transportation systems (Print)  
This article presents a survey covering the distributed charging control schemes that facilitate distributed computation of electric vehicle (EV) charge schedules.  ...  The optimization tasks incorporate future route data and encompass multiple objectives, including safety, energy efficiency, and desired velocity tracking.  ...  In particular, the nonlinear vehicle dynamics, the nonlinear transmission efficiency map for different gear ratios, and the nonlinear fuel consumption map are learned for fuel consumption reduction.  ... 
doi:10.1109/tits.2020.3031998 fatcat:bkprv5oa25e3zhoj23nbrprj6e

Scanning the Issue

Azim Eskandarian
2021 IEEE transactions on intelligent transportation systems (Print)  
The control is robust, scalable in terms of transit network size, and thus easy to deploy by transit agencies to improve communication and guidance to drivers, and reduce costs.  ...  As a result, the performance of the controller is very efficient and similar to the one obtained with an optimal controller while the implementation of the controller (with an almost instantaneous computation  ...  The system is designed in a modular and scalable fashion allowing it to be implemented in large networks without significantly increasing the computational complexity.  ... 
doi:10.1109/tits.2021.3073191 fatcat:t2v7w23rmjex7eluksr46yo4v4

Scanning the Issue

Azim Eskandarian
2022 IEEE transactions on intelligent transportation systems (Print)  
This review summarizes deep reinforcement learning (DRL) algorithms and provides a taxonomy of automated driving tasks where (D)RL methods have been employed, while addressing key computational challenges  ...  The role of simulators in training agents, methods to validate, test, and robustify existing solutions in RL are discussed.  ...  Considering the individual dynamics, a distributed coordinated controller including both lateral and longitudinal motions is designed for each AV with an online estimation of the unknown parameters and  ... 
doi:10.1109/tits.2022.3174254 fatcat:o6z3ncdkgbh5dmvvywtok7hwke

New Frontiers for Scan Statistics: Network, Trajectory, and Text Data [chapter]

Renato M. Assunção, Roberto C. S. N. P. Souza, Marcos O. Prates
2020 Handbook of Scan Statistics  
Computer efficiency and scalability are essential aspects since the monitoring algorithm operates in real time and in large networks.  ...  Based on this distributional assumption, they propose a scalable algorithm for anomalous node detection.  ... 
doi:10.1007/978-1-4614-8414-1_47-1 fatcat:i7mruwigejc4ti2kufrvbd5qwm

Allocation Schemes, Architectures, and Policies for Collaborative Port Scanning Attacks

Yu Zhang, Bharat Bhargava
2011 Journal of Emerging Technologies in Web Intelligence  
Such port scanning schemes suffer from two problems: first, there are too many duplicate scannings and too much contention among different port scanners; second, a complete port scanning takes a long time  ...  In this paper, we present a fast DHT-based collaborative port scanning scheme that aims to eliminate duplicate scanning, minimize contention, and significantly increase the scanning speed.  ...  To address the issues above, our deployment plan employs the Distributed Hash Table ( DHT) to speed up the scanning, avoid duplicate scanning and contention, and efficiently process and summarize the  ... 
doi:10.4304/jetwi.3.2.154-167 fatcat:bamppop65ffihk7z4tz43qe5k4

SCAN: A Scalable Model of Attentional Selection

Eric O. Postma, H.Jaap van den Herik, Patrick T.W. Hudson
1997 Neural Networks  
Thispaper describes the SCAN (Signal Channeling Attentional Network) model, a scalable neural network model for attentional scanning.  ...  Selected patterns are channeled through a gating network formed by a hierarchical jiactal structure of gating lattices, and mapped onto an output window.  ...  ART networks (Carpenter & Grossberg, 1987a, b) meet these functional requirements and the SCAN model as a whole can be seen as the combination of a gating network and an ART network.  ... 
doi:10.1016/s0893-6080(97)00034-8 pmid:12662495 fatcat:rep5but7m5eyjcjlfjv2dh4oqe

Misleading and defeating importance-scanning malware propagation

Guofei Gu, Zesheng Chen, Phillip Porras, Wenke Lee
2007 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007  
We propose the use of white hole networks, which combine several existing components to dissuade, slow, and ultimately halt the propagation of importance scanning malware.  ...  of this countermeasure represents a very small fraction of the address space population. • Address mapper: Actively collects and updates the unused IP/port segment of the network that the white  ...  Army Research Office (ARO) under the Cyber-TA Research Grant No.W911NF-06-1-0316 and Grant W911NF0610042, and by the National Science Foundation under Grants CCR-0133629 and CNS-0627477.  ... 
doi:10.1109/seccom.2007.4550340 dblp:conf/securecomm/GuCPL07 fatcat:gonvqqk4yrahnla6fnhn2tbidm

CANVuS: Context-Aware Network Vulnerability Scanning [chapter]

Yunjing Xu, Michael Bailey, Eric Vander Weele, Farnam Jahanian
2010 Lecture Notes in Computer Science  
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks.  ...  Using this architecture, we built CANVuS, a context-aware network vulnerability scanning system that triggers scanning operations based on changes indicated by network activities.  ...  numbers CNS 091639, CNS 08311174, CNS 0627445, and CNS 0751116, and the Department of the Navy under contract N000.14-09-1-1042.  ... 
doi:10.1007/978-3-642-15512-3_8 fatcat:njbiivb43vb5dnws45ym23mbpi

Access Port Protection for Reconfigurable Scan Networks

Rafal Baranowski, Michael A. Kochte, Hans-Joachim Wunderlich
2014 Journal of electronic testing  
This paper describes a scalable solution for multilevel access management in reconfigurable scan networks. The access to protected instruments is restricted locally at the interface to the network.  ...  While state-of-theart protection methods for scan architectures compliant with JTAG and SECT are very effective, most of these techniques face scalability issues in reconfigurable scan networks allowed  ...  scan segment (or a scan network hierarchy) to the higher-level scan chain, depending on the content of the configuration segment [15] .  ... 
doi:10.1007/s10836-014-5484-2 fatcat:62atrokmync2bh4gzagy5sdhze

Surveying Port Scans and Their Detection Methodologies

M. H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita
2011 Computer journal  
It is a very difficult task to recognize instances of malicious port scanning. In general, a port scan may be an instance of a scan by attackers or an instance of a scan by network defenders.  ...  However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks.  ...  ACKNOWLEDGEMENTS This work is one of the outcomes of a research project funded by Department of Information Technology, Government of India. Authors are thankful to DIT for funding the project.  ... 
doi:10.1093/comjnl/bxr035 fatcat:knlumcfv3rgpbc2lakgu3e4kie

Stochastic analysis of horizontal IP scanning

Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov
2012 2012 Proceedings IEEE INFOCOM  
However, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast scan techniques that can remain virtually undetectable at large-scale  ...  To address these questions, we propose a simple analytical model for the window-expiration rules of popular IDS tools (i.e., Snort and Bro) and utilize a variation of the Chen-Stein theorem to derive the  ...  , confusing IP options and flags [30] , [34] , and polymorphic packet contents [13] ).  ... 
doi:10.1109/infcom.2012.6195589 dblp:conf/infocom/LeonardYWL12 fatcat:uts263o4yjbgjhz72lhoxeqft4
« Previous Showing results 1 — 15 out of 22,555 results