Sciweavers

5816 search results - page 1082 / 1164
» Distributed Management by Delegation
Sort
View
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 4 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 4 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 4 months ago
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP)
Anomalous windows are the contiguous groupings of data points. In this paper, we propose an approach for discovering anomalous windows using Scan Statistics for Linear Intersectin...
Lei Shi, Vandana Pursnani Janeja
CCGRID
2009
IEEE
15 years 4 months ago
The Eucalyptus Open-Source Cloud-Computing System
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC ...
Daniel Nurmi, Richard Wolski, Chris Grzegorczyk, G...
ICAC
2009
IEEE
15 years 4 months ago
AdaptGuard: guarding adaptive systems from instability
In this paper, we design, implement and evaluate AdaptGuard, a software service for guarding adaptive systems, such as QoS-adaptive servers, from instability caused by software an...
Jin Heo, Tarek F. Abdelzaher
« Prev « First page 1082 / 1164 Last » Next »