Sciweavers

1624 search results - page 285 / 325
» Integrating Fault-Tolerant Techniques into the Design of Cri...
Sort
View
118
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
SIGSOFT
2008
ACM
15 years 11 months ago
Semi-automating small-scale source code reuse via structural correspondence
Developers perform small-scale reuse tasks to save time and to increase the quality of their code, but due to their small scale, the costs of such tasks can quickly outweigh their...
Rylan Cottrell, Robert J. Walker, Jörg Denzin...
WWW
2003
ACM
15 years 10 months ago
Efficient URL caching for world wide web crawling
Crawling the web is deceptively simple: the basic algorithm is (a) Fetch a page (b) Parse it to extract all linked URLs (c) For all the URLs not seen before, repeat (a)?(c). Howev...
Andrei Z. Broder, Marc Najork, Janet L. Wiener
74
Voted
CAISE
2005
Springer
15 years 3 months ago
Self-Organization in Overlay Networks
Abstract. Overlay networks are an important kind of P2P infrastructures. The range of applications and requirements is broad. Consequently, our research objective are overlay netwo...
Sven Apel, Klemens Böhm
ICSM
1999
IEEE
15 years 2 months ago
Building Documentation Generators
In order to maintain the consistency between sources and documentation, while at the same time providing documentation at the design level, it is necessary to generate documentati...
Arie van Deursen, Tobias Kuipers