Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Whole-file transfer is a basic primitive for Internet content dissemination. Content servers are increasingly limited by disk arm movement given the rapid growth in disk density, ...
Stergios V. Anastasiadis, Rajiv Wickremesinghe, Je...
We present a general Multi-Agent System framework for distributed data mining based on a Peer-toPeer model. The framework adopts message-based asynchronous communication and a dyn...
Most Internet services rely on the traditional client-server model, where the quality of services usually depends on the performance of those servers. In this paper, we propose a ...
Chei-Yol Kim, Sung-Hoon Sohn, Baik-Song Ahn, Gyu-I...