Sciweavers

1528 search results - page 252 / 306
» Implementing Generalized Operator Overloading
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
14 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
SBBD
2004
137views Database» more  SBBD 2004»
14 years 11 months ago
A Lock Manager for Collaborative Processing of Natively Stored XML Documents
Today, neither transactional provisions, in general, nor concurrency control, in particular, of DBMS-based processing are tailored to the specific needs of large and collaborative...
Michael Peter Haustein, Theo Härder
TREC
2004
14 years 11 months ago
Amberfish at the TREC 2004 Terabyte Track
The TREC 2004 Terabyte Track evaluated information retrieval in largescale text collections, using a set of 25 million documents (426 GB). This paper gives an overview of our expe...
Nassib Nassar
CONEXT
2009
ACM
14 years 11 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
SIGCOMM
2010
ACM
14 years 10 months ago
Generic and automatic address configuration for data center networks
Data center networks encode locality and topology information into their server and switch addresses for performance and routing purposes. For this reason, the traditional address...
Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zh...