Sciweavers

201 search results - page 32 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
CCS
2009
ACM
15 years 5 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
IPPS
2002
IEEE
15 years 3 months ago
Memory-Intensive Benchmarks: IRAM vs. Cache-Based Machines
The increasing gap between processor and memory performance has led to new architectural models for memory-intensive applications. In this paper, we use a set of memory-intensive ...
Brian R. Gaeke, Parry Husbands, Xiaoye S. Li, Leon...
DSN
2005
IEEE
15 years 4 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
191
Voted
SIGMOD
2008
ACM
162views Database» more  SIGMOD 2008»
15 years 11 months ago
Event queries on correlated probabilistic streams
A major problem in detecting events in streams of data is that the data can be imprecise (e.g. RFID data). However, current state-ofthe-art event detection systems such as Cayuga ...
Christopher Ré, Dan Suciu, Julie Letchner, ...
SIGIR
2009
ACM
15 years 5 months ago
Evaluating web search using task completion time
We consider experiments to measure the quality of a web search algorithm based on how much total time users take to complete assigned search tasks using that algorithm. We first ...
Ya Xu, David Mease