Sciweavers

2060 search results - page 411 / 412
» Performability Evaluation of Networked Storage Systems Using...
Sort
View
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
14 years 5 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...
ARTMED
2004
118views more  ARTMED 2004»
13 years 5 months ago
Bayesian fluorescence in situ hybridisation signal classification
Previous research has indicated the significance of accurate classification of fluorescence in situ hybridisation (FISH) signals for the detection of genetic abnormalities. Based ...
Boaz Lerner
EXPCS
2007
13 years 9 months ago
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on low...
Jelena Mirkovic, Alefiya Hussain, Brett Wilson, So...
COMSUR
2006
84views more  COMSUR 2006»
13 years 5 months ago
A survey of handover algorithms in DVB-H
Digital Video Broadcasting for Handhelds (DVB-H) is a standard for broadcasting IP Datacast (IPDC) services to mobile handheld terminals. Based on the DVB-T standard, DVB-H adds n...
Xiaodong Yang, Jani Väre, Thomas J. Owens
ESORICS
2004
Springer
13 years 11 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee