Sciweavers

36320 search results - page 7164 / 7264
» From Code to Models
Sort
View
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 4 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
153
Voted
DMIN
2006
124views Data Mining» more  DMIN 2006»
15 years 4 months ago
Use of Multivariate Data Analysis for Lumber Drying Process Monitoring and Fault Detection
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Mouloud Amazouz, Radu Pantea
102
Voted
FAST
2004
15 years 4 months ago
Circus: Opportunistic Block Reordering for Scalable Content Servers
Whole-file transfer is a basic primitive for Internet content dissemination. Content servers are increasingly limited by disk arm movement given the rapid growth in disk density, ...
Stergios V. Anastasiadis, Rajiv Wickremesinghe, Je...
177
Voted
EUMAS
2006
15 years 4 months ago
A Customizable Multi-Agent System for Distributed Data Mining
We present a general Multi-Agent System framework for distributed data mining based on a Peer-toPeer model. The framework adopts message-based asynchronous communication and a dyn...
Giancarlo Fortino, Giuseppe Di Fatta
137
Voted
IADIS
2004
15 years 4 months ago
A Scalable I/O Architecture and File System for Internet Servers
Most Internet services rely on the traditional client-server model, where the quality of services usually depends on the performance of those servers. In this paper, we propose a ...
Chei-Yol Kim, Sung-Hoon Sohn, Baik-Song Ahn, Gyu-I...
« Prev « First page 7164 / 7264 Last » Next »