University of Nevada, Reno

Displaying 1-8 of 8 results

  • White Papers // May 2012

    QoS Assurance for Video Service Over Heterogeneous Mobile Hotspots

    A mobile hotspot in a vehicular environment consists of a group of end users that move as a whole in a public transit. This paper analyzes the performance of video service in mobile hotspots based on heterogeneous wireless technologies. The authors jointly consider the contention-based random access of the WLAN...

    Provided By University of Nevada, Reno

  • White Papers // Oct 2010

    Selective Regular Expression Matching

    The signature-based intrusion detection is one of the most commonly used techniques implemented in modern Intrusion Detection Systems (IDS). One of the powerful tools that gained wide acceptance in IDS signatures over the past several years is the regular expressions. How-ever, the performance requirements of traditional methods for matching the...

    Provided By University of Nevada, Reno

  • White Papers // Jun 2010

    The Effect Of Government Purchases On Economic Growth In Japan

    The authors consider whether there is statistical evidence for a causal relationship between government expenditures and real GDP growth in postwar Japan. After studying the time-series properties of these variables, they find that government consumption and government investment both have a positive and causal effect on growth. This suggests that...

    Provided By University of Nevada, Reno

  • White Papers // Mar 2010

    Odin II - An Open-Source Verilog HDL Synthesis Tool for CAD Research

    In this paper, the authors present Odin II, a framework for Verilog Hardware Description Language (VHDL) synthesis that allows researchers to investigate approaches/improvements to different phases of HDL elaboration that have not been previously possible. Odin II's output can be fed into traditional back-end flows for both FPGAs and ASICs...

    Provided By University of Nevada, Reno

  • White Papers // Oct 2009

    Hybrid Traffic Classification Approach Based on Decision Tree

    Classifying network traffic is very challenging and is still an issue yet to be solved due to the increase of new applications and traffic encryption. In this paper, the authors propose a novel hybrid approach for the network flow classification, in which they first apply the payload signature based classifier...

    Provided By University of Nevada, Reno

  • White Papers // May 2009

    A Detailed Analysis of the KDD CUP 99 Data Set

    During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted an statistical analysis on this data set, the authors...

    Provided By University of Nevada, Reno

  • White Papers // Mar 2009

    An Incremental Frequent Structure Mining Framework for Real-Time Alert Correlation

    In this paper, the authors propose a framework for real-time alert correlation which incorporates novel techniques for aggregating alerts into structured patterns and incremental mining of frequent structured patterns. Their approach to aggregation provides a reduced view of developed patterns of alerts. At the core of the proposed framework is...

    Provided By University of Nevada, Reno

  • White Papers // Oct 2006

    Web Services vs. ebXML: An Evaluation of Web Services and ebXML for e-Business Applications

    For companies operating in an increasingly globalized business environment, e-business means online transactions, automated business collaborations and system integration. This means not only to provide products through supply chains, but also to delivery services and information through networks. The e-business tools and standards come from two domains known as Web...

    Provided By University of Nevada, Reno

  • White Papers // May 2009

    A Detailed Analysis of the KDD CUP 99 Data Set

    During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted an statistical analysis on this data set, the authors...

    Provided By University of Nevada, Reno

  • White Papers // Mar 2009

    An Incremental Frequent Structure Mining Framework for Real-Time Alert Correlation

    In this paper, the authors propose a framework for real-time alert correlation which incorporates novel techniques for aggregating alerts into structured patterns and incremental mining of frequent structured patterns. Their approach to aggregation provides a reduced view of developed patterns of alerts. At the core of the proposed framework is...

    Provided By University of Nevada, Reno

  • White Papers // Oct 2009

    Hybrid Traffic Classification Approach Based on Decision Tree

    Classifying network traffic is very challenging and is still an issue yet to be solved due to the increase of new applications and traffic encryption. In this paper, the authors propose a novel hybrid approach for the network flow classification, in which they first apply the payload signature based classifier...

    Provided By University of Nevada, Reno

  • White Papers // Jun 2010

    The Effect Of Government Purchases On Economic Growth In Japan

    The authors consider whether there is statistical evidence for a causal relationship between government expenditures and real GDP growth in postwar Japan. After studying the time-series properties of these variables, they find that government consumption and government investment both have a positive and causal effect on growth. This suggests that...

    Provided By University of Nevada, Reno

  • White Papers // Oct 2010

    Selective Regular Expression Matching

    The signature-based intrusion detection is one of the most commonly used techniques implemented in modern Intrusion Detection Systems (IDS). One of the powerful tools that gained wide acceptance in IDS signatures over the past several years is the regular expressions. How-ever, the performance requirements of traditional methods for matching the...

    Provided By University of Nevada, Reno

  • White Papers // May 2012

    QoS Assurance for Video Service Over Heterogeneous Mobile Hotspots

    A mobile hotspot in a vehicular environment consists of a group of end users that move as a whole in a public transit. This paper analyzes the performance of video service in mobile hotspots based on heterogeneous wireless technologies. The authors jointly consider the contention-based random access of the WLAN...

    Provided By University of Nevada, Reno

  • White Papers // Mar 2010

    Odin II - An Open-Source Verilog HDL Synthesis Tool for CAD Research

    In this paper, the authors present Odin II, a framework for Verilog Hardware Description Language (VHDL) synthesis that allows researchers to investigate approaches/improvements to different phases of HDL elaboration that have not been previously possible. Odin II's output can be fed into traditional back-end flows for both FPGAs and ASICs...

    Provided By University of Nevada, Reno

  • White Papers // Oct 2006

    Web Services vs. ebXML: An Evaluation of Web Services and ebXML for e-Business Applications

    For companies operating in an increasingly globalized business environment, e-business means online transactions, automated business collaborations and system integration. This means not only to provide products through supply chains, but also to delivery services and information through networks. The e-business tools and standards come from two domains known as Web...

    Provided By University of Nevada, Reno