Sciweavers

5934 search results - page 1116 / 1187
» Detecting a Network Failure
Sort
View
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
16 years 5 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han
251
Voted
POPL
2005
ACM
16 years 5 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
VLDB
2007
ACM
190views Database» more  VLDB 2007»
16 years 5 months ago
Request Window: an Approach to Improve Throughput of RDBMS-based Data Integration System by Utilizing Data Sharing Across Concur
This paper focuses on the problem of improving distributed query throughput of the RDBMS-based data integration system that has to inherit the query execution model of the underly...
Rubao Lee, Minghong Zhou, Huaming Liao
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
16 years 5 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
ICSE
2008
IEEE-ACM
16 years 5 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
« Prev « First page 1116 / 1187 Last » Next »