Sciweavers

19 search results - page 4 / 4
» Testing Intrusion Detection Systems in MANET: A Comprehensiv...
Sort
View
PLDI
2012
ACM
11 years 7 months ago
Understanding and detecting real-world performance bugs
Developers frequently use inefficient code sequences that could be fixed by simple patches. These inefficient code sequences can cause significant performance degradation and ...
Guoliang Jin, Linhai Song, Xiaoming Shi, Joel Sche...
ACMSE
2005
ACM
13 years 7 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 5 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
SIGMOD
2010
ACM
196views Database» more  SIGMOD 2010»
13 years 9 months ago
Connected substructure similarity search
Substructure similarity search is to retrieve graphs that approximately contain a given query graph. It has many applications, e.g., detecting similar functions among chemical com...
Haichuan Shang, Xuemin Lin, Ying Zhang, Jeffrey Xu...