—To date many activity spotting approaches are static: once the system is trained and deployed it does not change anymore. There are substantial shortcomings of this approach, sp...
Grid and distributed computing environments are evolving rapidly and driving the development of system and network technologies. The design of applications has placed an increased...
In this paper, we present the design and implementation of Dodo, an e cient user-level system for harvesting idle memory in o -the-shelf clusters of workstations. Dodo enables dat...
Mirroring is often used to enhance the reliability of disk systems, but it is usually considered expensive because it duplicates storage cost and increases the cost of writes. Tra...
Christos A. Polyzois, Anupam Bhide, Daniel M. Dias
In last decades there have been many proposals from the machine learning community in the intrusion detection field. One of the main problems that Intrusion Detection Systems (IDSs...