Sciweavers

156 search results - page 13 / 32
» A Practical Approach to NFS Response Time Monitoring
Sort
View
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 1 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
IMC
2010
ACM
14 years 11 months ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
15 years 6 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
EDBT
2008
ACM
171views Database» more  EDBT 2008»
16 years 1 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack
RE
2010
Springer
14 years 8 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa