Sciweavers

1869 search results - page 146 / 374
» Analysis of Network Processing Workloads
Sort
View
125
Voted
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 6 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
112
Voted
APIN
2010
107views more  APIN 2010»
15 years 4 months ago
Extracting reduced logic programs from artificial neural networks
Artificial neural networks can be trained to perform excellently in many application areas. While they can learn from raw data to solve sophisticated recognition and analysis prob...
Jens Lehmann, Sebastian Bader, Pascal Hitzler
ICDE
2006
IEEE
181views Database» more  ICDE 2006»
16 years 5 months ago
Adaptive Reorganization of Coherency-Preserving Dissemination Tree for Streaming Data
In many recent applications, data are continuously being disseminated from a source to a set of servers. In this paper, we propose a cost-based approach to construct dissemination...
Yongluan Zhou, Beng Chin Ooi, Kian-Lee Tan, Feng Y...
CCS
2007
ACM
15 years 10 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
VLDB
2005
ACM
117views Database» more  VLDB 2005»
15 years 10 months ago
Parallel Querying with Non-Dedicated Computers
We present DITN, a new method of parallel querying based on dynamic outsourcing of join processing tasks to non-dedicated, heterogeneous computers. In DITN, partitioning is not th...
Vijayshankar Raman, Wei Han, Inderpal Narang