Sciweavers

3651 search results - page 557 / 731
» Data Mining for Security Applications
Sort
View
INFOCOM
2000
IEEE
15 years 9 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
16 years 5 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi
CLOUD
2010
ACM
15 years 10 months ago
Stateful bulk processing for incremental analytics
This work addresses the need for stateful dataflow programs that can rapidly sift through huge, evolving data sets. These data-intensive applications perform complex multi-step c...
Dionysios Logothetis, Christopher Olston, Benjamin...
BMCBI
2006
167views more  BMCBI 2006»
15 years 5 months ago
The bovine QTL viewer: a web accessible database of bovine Quantitative Trait Loci
Background: Many important agricultural traits such as weight gain, milk fat content and intramuscular fat (marbling) in cattle are quantitative traits. Most of the information on...
Pavana Polineni, Prathyusha Aragonda, Suresh R. Xa...
ESORICS
2009
Springer
16 years 6 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...