Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
We survey three examples of large-scale scientific workflows that we are working with at Cornell: the Arecibo sky survey, the CLEO high-energy particle physics experiment, and t...
William Y. Arms, Selcuk Aya, Manuel Calimlim, Jim ...
Ontologies provide a means of modelling and representing a knowledge domain. Such representation, already used in purpose-built distributed information systems, can also be of gre...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
In the case of large-scale distributed environments such as the Internet, users are interested in monitoring changes to a particular web page (XML or HTML). There are many instanc...
In order to formulate a meaningful XML query, a user must have some knowledge of the schema of the XML documents to be queried. The query will succeed only if the schema of the ac...
Cindy X. Chen, George A. Mihaila, Sriram Padmanabh...