Sciweavers

1291 search results - page 72 / 259
» Intrusion Detection for Distributed Applications
Sort
View
86
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Perfect Failure Detection in the Partitioned Synchronous Distributed System Model
—In this paper we show that it is possible to implement a perfect failure detector P (one that detects all faulty processes if and only if those processes failed) in a non-synchr...
Raimundo José de Araújo Macêdo...
98
Voted
IJCNN
2006
IEEE
15 years 6 months ago
Data Fusion for Outlier Detection through Pseudo-ROC Curves and Rank Distributions
— This paper proposes a novel method of fusing models for classification of unbalanced data. The unbalanced data contains a majority of healthy (negative) instances, and a minor...
Paul F. Evangelista, Mark J. Embrechts, Boleslaw K...
104
Voted
USENIX
2008
15 years 2 months ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
96
Voted
AINA
2007
IEEE
15 years 7 months ago
Geo-Linda: a Geometry Aware Distributed Tuple Space
This paper presents Geo-Linda, a physically distributed tuple space. Geo-Linda targets ubiquitous computing applications involving the detection of movement patterns of objects an...
Julien Pauty, Paul Couderc, Michel Banâtre, ...
101
Voted
SAC
2008
ACM
15 years 19 hour ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....