Sciweavers

5489 search results - page 1050 / 1098
» Evaluating evaluation measure stability
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 5 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
IWQOS
2004
Springer
15 years 5 months ago
Yaksha: a self-tuning controller for managing the performance of 3-tiered Web sites
— Managing the performance of multiple-tiered Web sites under high client loads is a critical problem with the advent of dynamic content and database-driven servers on the Intern...
Abhinav Kamra, Vishal Misra, Erich M. Nahum
KR
2004
Springer
15 years 5 months ago
Towards a Quantitative, Platform-Independent Analysis of Knowledge Systems
The Halo Pilot, a six-month effort to evaluate the state-ofthe-art in applied Knowledge Representation and Reasoning (KRR) systems, collaboratively developed a taxonomy of failure...
Noah S. Friedland, Paul G. Allen, Michael J. Witbr...
MIDDLEWARE
2004
Springer
15 years 5 months ago
iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations
The very nature of implementing and evaluating fully distributed algorithms or protocols in application-layer overlay networks involves certain programming tasks that are at best m...
Baochun Li, Jiang Guo, Mea Wang
« Prev « First page 1050 / 1098 Last » Next »