Sciweavers

1926 search results - page 288 / 386
» Hierarchical Peer-to-Peer Systems
Sort
View
141
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 7 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
WWW
2007
ACM
16 years 1 months ago
Towards effective browsing of large scale social annotations
This paper is concerned with the problem of browsing social annotations. Today, a lot of services (e.g., Del.icio.us, Filckr) have been provided for helping users to manage and sh...
Rui Li, Shenghua Bao, Yong Yu, Ben Fei, Zhong Su
202
Voted
POPL
2009
ACM
16 years 1 months ago
Modular code generation from synchronous block diagrams: modularity vs. code size
We study modular, automatic code generation from hierarchical block diagrams with synchronous semantics. Such diagrams are the fundamental model behind widespread tools in the emb...
Roberto Lublinerman, Christian Szegedy, Stavros Tr...
192
Voted
VLDB
2001
ACM
127views Database» more  VLDB 2001»
16 years 27 days ago
Efficiently publishing relational data as XML documents
: XML is rapidly emerging as a standard for exchanging business data on the World Wide Web. For the foreseeable future, however, most business data will continue to be stored in re...
Jayavel Shanmugasundaram, Eugene J. Shekita, Rimon...
115
Voted
MOBIHOC
2007
ACM
16 years 7 days ago
Scalable routing in delay tolerant networks
The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout...
Cong Liu, Jie Wu