Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
In this paper we present a model of versioned web sites which is aimed at building a web site configuration. The web site configuration is a consistent version of the web site an...
In this paper, we address the problem of designing a scalable, accurate query processor for peerto-peer filesharing and similar distributed keyword search systems. Using a global...
Boon Thau Loo, Joseph M. Hellerstein, Ryan Huebsch...
String comparison is a critical issue in many application domains, including speech recognition, contents search, and bioinformatics. The similarity between two strings of lengths...
Information retrieval is generally considered an individual activity, and information retrieval research and tools reflect this view. As digitally mediated communication and infor...
Steven E. Poltrock, Jonathan Grudin, Susan T. Duma...