Sciweavers

677 search results - page 136 / 136
» Experiences from Developing a Distributed Context Management...
Sort
View
CCS
2003
ACM
13 years 11 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
SSDBM
2003
IEEE
164views Database» more  SSDBM 2003»
13 years 11 months ago
Approximate String Joins
String data is ubiquitous, and its management has taken on particular importance in the past few years. Approximate queries are very important on string data especially for more c...
Divesh Srivastava