Sciweavers

923 search results - page 88 / 185
» Factorizing Languages
Sort
View
LISA
2008
15 years 2 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
INTERNET
2008
150views more  INTERNET 2008»
14 years 12 months ago
RPC and REST: Dilemma, Disruption, and Displacement
straction and explained how the Representational State Transfer (REST) architectural style is one alternative that can yield a superior approach to building distributed systems. Be...
Steve Vinoski
ASPLOS
2006
ACM
15 years 5 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
IUI
2006
ACM
15 years 5 months ago
How to talk to a hologram
There is a growing need for creating life-like virtual human simulations that can conduct a natural spoken dialog with a human student on a predefined subject. We present an over...
Anton Leuski, Jarrell Pair, David R. Traum, Peter ...
WWW
2007
ACM
16 years 17 days ago
Estimating the cardinality of RDF graph patterns
Most RDF query languages allow for graph structure search through a conjunction of triples which is typically processed using join operations. A key factor in optimizing joins is ...
Angela Maduko, Kemafor Anyanwu, Amit P. Sheth, Pau...