Sciweavers

591 search results - page 89 / 119
» Implementing Joins Using Extensible Pattern Matching
Sort
View
NSDI
2010
14 years 11 months ago
SplitScreen: Enabling Efficient, Distributed Malware Detection
We present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase...
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Tru...
PLANX
2007
14 years 11 months ago
XML Transformation Language Based on Monadic Second Order Logic
Although monadic second-order logic (MSO) has been a foundation of XML queries, little work has attempted to take MSO formulae themselves as a programming construct. Indeed, MSO f...
Kazuhiro Inaba, Haruo Hosoya
76
Voted
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
GG
2008
Springer
14 years 10 months ago
Model-Driven Development of Model Transformations
The model-driven development of model transformations requires both a technique to model model transformations as well as a means to transform transformation models. Therefore, t...
Pieter Van Gorp
ICDE
2006
IEEE
183views Database» more  ICDE 2006»
15 years 3 months ago
Similarity Queries on Structured Data in Structured Overlays
Structured P2P systems based on distributed hash tables are a popular choice for building large-scaled data management systems. Generally, they only support exact match queries, b...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...