Sciweavers

234 search results - page 31 / 47
» Entity Data Management in OKKAM
Sort
View
82
Voted
CCS
2003
ACM
15 years 5 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
WSC
2004
15 years 1 months ago
A Scenario Generation Tool for DDF Simulation Testbeds
An interactive tool has been developed for visualizing and creating scaled battlefield based scenarios for use in a simulation testbed to develop and test distributed data fusion ...
Govindarajan Srimathveeravalli, Navneeth Subramani...
JCP
2006
173views more  JCP 2006»
15 years 12 days ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
HT
2004
ACM
15 years 5 months ago
Automatic generation of hypertext system repositories: a model driven approach
In this paper, we present a model-driven methodology and toolset for automatic generation of hypertext system repositories. Our code generator, called Bamboo, is based on a Contai...
E. James Whitehead Jr., Guozheng Ge, Kai Pan
135
Voted
ICPADS
2005
IEEE
15 years 6 months ago
A Model for Distributing and Querying a Data Warehouse on a Computing Grid
Data warehouses store large volumes of data according to a multidimensional model with dimensions representing different axes of analysis. OLAP systems (OnLine Analytical Processi...
Pascal Wehrle, Maryvonne Miquel, Anne Tchounikine