Sciweavers

1075 search results - page 76 / 215
» Communities Detection in Large Networks
Sort
View
RAID
2009
Springer
15 years 4 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
IICS
2005
Springer
15 years 3 months ago
Towards P2P Information Systems
P2P systems draw large communities of users and create most of the Internet traffic. Two typical P2P myths are (1) that P2P is about sharing of audio and video content and (2) that...
Magnus Kolweyh, Ulrike Lechner
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
14 years 11 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
SIGMOD
2002
ACM
132views Database» more  SIGMOD 2002»
15 years 10 months ago
Clustering by pattern similarity in large data sets
Clustering is the process of grouping a set of objects into classes of similar objects. Although definitions of similarity vary from one clustering model to another, in most of th...
Haixun Wang, Wei Wang 0010, Jiong Yang, Philip S. ...
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 4 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...