Sciweavers

13 search results - page 1 / 3
» Eliminating the Performance Anomaly of 802.11b
Sort
View
ICN
2005
Springer
13 years 10 months ago
Eliminating the Performance Anomaly of 802.11b
Abstract. In this paper, we propose a mechanism to eliminate the performance anomaly of IEEE 802.11b. Performance anomaly happens when nodes that have different transmission rates...
See-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck ...
SIGMOD
1995
ACM
126views Database» more  SIGMOD 1995»
13 years 8 months ago
View Maintenance in a Warehousing Environment
A warehouse is a repository of integrated information drawn from remote data sources. Since a warehouse e ectively implements materialized views, we must maintain the views as the...
Yue Zhuge, Hector Garcia-Molina, Joachim Hammer, J...
CCS
2009
ACM
13 years 11 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
ACSAC
2008
IEEE
13 years 6 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
FLAIRS
2004
13 years 6 months ago
Interactive Refinement of a Knowledge Base
This paper presents a new method of interactive refinement of a knowledge base. The first step of our method is a validation stage which checks the consistency and the completenes...
R. Djelouah, Béatrice Duval, Stéphan...