Sciweavers

18572 search results - page 3450 / 3715
» High performance C
Sort
View
114
Voted
ACSAC
1998
IEEE
15 years 5 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
KDD
1999
ACM
206views Data Mining» more  KDD 1999»
15 years 5 months ago
Compressed Data Cubes for OLAP Aggregate Query Approximation on Continuous Dimensions
Efficiently answering decision support queries is an important problem. Most of the work in this direction has been in the context of the data cube. Queries are efficiently answer...
Jayavel Shanmugasundaram, Usama M. Fayyad, Paul S....
108
Voted
ICNP
1998
IEEE
15 years 5 months ago
Darwin: Customizable Resource Management for Value-Added Network Services
The Internet is rapidly changing from a set of wires and switches that carry packets into a sophisticated infrastructure that delivers a set of complex value-added services to end...
Prashant R. Chandra, Allan Fisher, Corey Kosak, T....
116
Voted
SAS
1999
Springer
106views Formal Methods» more  SAS 1999»
15 years 5 months ago
Translating Out of Static Single Assignment Form
Programs represented in Static Single Assignment (SSA) form contain phi instructions (or functions) whose operational semantics are to merge values coming from distinct control flo...
Vugranam C. Sreedhar, Roy Dz-Ching Ju, David M. Gi...
104
Voted
SIGCOMM
1998
ACM
15 years 5 months ago
The MASC/BGMP Architecture for Inter-Domain Multicast Routing
Multicast routing enables e cient data distribution to multiple recipients. However, existing work has concentrated on extending single-domain techniques to wide-area networks, ra...
Satish Kumar, Pavlin Radoslavov, David Thaler, Cen...
« Prev « First page 3450 / 3715 Last » Next »