Sciweavers

273 search results - page 43 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
PVLDB
2011
14 years 11 days ago
Merging What's Cracked, Cracking What's Merged: Adaptive Indexing in Main-Memory Column-Stores
Adaptive indexing is characterized by the partial creation and refinement of the index as side effects of query execution. Dynamic or shifting workloads may benefit from prelimi...
Stratos Idreos, Stefan Manegold, Harumi A. Kuno, G...
SAC
2009
ACM
15 years 4 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
ML
2006
ACM
15 years 3 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
DSN
2008
IEEE
15 years 4 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
MOBIDE
1999
ACM
15 years 1 months ago
Data Warehousing Alternatives for Mobile Environments
With rapid advancement in technology, mobile devices are increasingly becoming the norm. These devices are characterized by their need to operate even when they are disconnected f...
Ioana Stanoi, Divyakant Agrawal, Amr El Abbadi, Sh...