Sciweavers

4255 search results - page 757 / 851
» Cover
Sort
View
CCS
2005
ACM
15 years 10 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ASSETS
2004
ACM
15 years 10 months ago
Semantic bookmarking for non-visual web access
Bookmarks are shortcuts that enable quick access of the desired Web content. They have become a standard feature in any browser and recent studies have shown that they can be very...
Saikat Mukherjee, I. V. Ramakrishnan, Michael Kife...
CSCW
2004
ACM
15 years 10 months ago
Maintaining redundancy in the coordination of medical emergencies
This paper reports from a study of Norwegian medical emergency call (AMK) centres, in which advanced radio and telephone communication technologies are handled by a team of nurses...
Aksel Tjora
140
Voted
DOLAP
2004
ACM
15 years 10 months ago
Physical modeling of data warehouses using UML
During the few last years, several approaches have been proposed to model different aspects of a Data Warehouse (DW), such as the conceptual model of the DW, the design of the ET...
Sergio Luján-Mora, Juan Trujillo
IMC
2004
ACM
15 years 10 months ago
An analysis of live streaming workloads on the internet
In this paper, we study the live streaming workload from a large content delivery network. Our data, collected over a 3 month period, contains over 70 million requests for 5,000 d...
Kunwadee Sripanidkulchai, Bruce M. Maggs, Hui Zhan...