Sciweavers

1486 search results - page 126 / 298
» Firewall Rules Analysis
Sort
View
FGIT
2009
Springer
15 years 10 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
IMSCCS
2007
IEEE
15 years 10 months ago
TOPSAW Sawing Optimization Analysis Using Grid Computing
TOPSAW program was developed by Dr. S. Chang and his team and has been successfully used in the replication of sawmill cutting to determine the optimal cutting pattern for a log t...
Ashwin Bommathanahalli, Maoyuan Xie, Zhifeng Yun, ...
VLDB
2007
ACM
106views Database» more  VLDB 2007»
15 years 10 months ago
Why You Should Run TPC-DS: A Workload Analysis
The Transaction Processing Performance Council (TPC) is completing development of TPC-DS, a new generation industry standard decision support benchmark. The TPC-DS benchmark, firs...
Meikel Pöss, Raghunath Othayoth Nambiar, Davi...
LAWEB
2006
IEEE
15 years 10 months ago
Analysis of Web Search Engine Clicked Documents
In this paper we process and analyze web search engine query and click data from the perspective of the documents (URL’s) selected. We initially define possible document categor...
David F. Nettleton, Liliana Calderón-Benavi...
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...