• Login
    Search 
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 25

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Attack Generation for NIDS Testing Using Natural Deduction 

    Rubin, Shai; Jha, Somesh; Miller, Barton P. (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it fails to recognize. For example, to avoid matching between the attack payload and the ...
    Thumbnail

    On the Design and Use of Internet Sinks for Network Abuse Monitoring 

    Yegneswaran, Vinod; Barford, Paul; Plonka, Dave (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important component in security architecture. Monitoring unused IP addresses offers opportunities to significantly improve perspective on ...
    Thumbnail

    Security Policy Reconciliation in Distributed Computing Environments 

    Wang, Hao; Jha, Somesh; Livny, Miron; McDaniel, Patrick (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The process of resolving different policies is known ...
    Thumbnail

    Spatial Resolution Enhancement of Video Using Still Images 

    Guo, Guodong; Dyer, Charles (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    Images captured by digital video cameras usually have lower spatial resolution than digital still cameras. This paper addresses the problem of combining images from digital still cameras and video cameras to generate a ...
    Thumbnail

    Benchmarking the MRNet Distributed Tool Infrastructure: Lessons Learned 

    Miller, Barton P.; Roth, Philip; Arnold, Dorian (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    MRNet is an infrastructure that provides scalable multicast and data aggregation functionality for distributed tools. While evaluating MRNet?s performance and scalability, we learned several important lessons about ...
    Thumbnail

    Abstraction Refinement for 3-Valued Logic Analysis 

    Loginov, Alexey; Reps, Thomas; Sagiv, Mooly (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    This paper concerns the question of how to create abstractions that are useful for program analysis. It presents a method that refines an abstraction automatically for analysis problems in which the semantics of statements ...
    Thumbnail

    Recognizing Faces from Head Rotation 

    Guo, Guodong; Dyer, Charles (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    A new approach for recognizing human faces is presented that uses video sequences of natural, uncontrolled head rotations to capture face motion and dynamic appearance characteristics. Unlike traditional methods for face ...
    Thumbnail

    Analysis and Evolution of a Journaling File System 

    Prabhakaran, Vijayan; Arpaci-Dusseau, Andrea; Arpaci-Dusseau, Remzi (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    We present measurements and analysis of the Linux ext3 file system. We develop and apply a novel analysis method known as semantic block-level analysis (SBA), which examines the low-level block stream that a file system ...
    Thumbnail

    A Framework for Malicious Workload Generation 

    Sommers, Joel; Yegneswaran, Vinod; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    Malicious traffic from self-propagating worms and denial-of-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats demands appropriate tools to conduct ...
    Thumbnail

    Content-Based Routing for Continuous Query-Optimization 

    Bizarro, Pedro; Babu, Shivnath; DeWitt, David; Widom, Jennifer (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    Current Data Stream Management Systems do not fully exploit their adaptive nature to handle complex queries. To date, such systems route stream tuples to operators or operator paths based only on operator-level statistics. ...
    • 1
    • 2
    • 3

    Contact Us | Send Feedback
     

     

    Browse

    All of MINDS@UWCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Discover

    AuthorJha, Somesh (5)Livny, Miron (4)Arpaci-Dusseau, Andrea (3)Arpaci-Dusseau, Remzi (3)Barford, Paul (3)Reps, Thomas (3)Sagiv, Mooly (3)Yegneswaran, Vinod (3)Dyer, Charles (2)Guo, Guodong (2)... View MoreDate Issued
    2004 (25)
    Has File(s)Yes (25)

    Contact Us | Send Feedback