Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:No... (Score 1) 116

arXiv holds pre-prints, and several fields, including some CS research, not only Physics uses the service. It doesn't count as publication in the academic world, since papers are not reviewed, so the entire edifice by which scholars get credit for their work doesn't apply. The open access movement, on the other hand, does apply to publications that count toward a scholar's reviewed work. Physics as a field, incidentally, is one of the more hide-bound in terms of adopting new publication schemes.

Comment Re:What is Google's interest? Data Tracking? (Score 2, Interesting) 363

Mtn. Vw's neighboring town, Palo Alto installed a fiber loop abt 10 yrs ago that sadly remains largely dark, except for several proximate firms that have rented access from the city. For instance, Facebook hdquarters had a tap installed when they moved. I don't think Google can follow, since it isn't sitting near the Palo Alto loop anywhere, however.

Comment Re:Not so fast... (Score 1) 116

Actually it would help detecting distributed attacks, since it is looking for a combination of small increments of traffic on numerous machines. Small, unreliable detections averaged over many machines equals a significant, reliable detection. This is having the law of large numbers on your side. Again, much of the work on distributed worm detection has been published, I recommend folks read it before spewing speculation. -JMA

Comment Re:what a useless article (Score 2, Insightful) 116

Yes, I'll agree the article isn't revealing. The difference between our work and "Autograph" type approaches that WormShield builds on is that we are doing traffic anomaly detection and these more involved approaches attempt to automatically build a signature. The paper is available (only, sigh) from Springer, in "Recent Advances in Intrusion Detection 11th International Symposium", RAID 2008, Cambridge, MA, USA. -JMA

Slashdot Top Deals

The IBM purchase of ROLM gives new meaning to the term "twisted pair". -- Howard Anderson, "Yankee Group"