Sciweavers

3341 search results - page 48 / 669
» Managing a Large
Sort
View
IAW
2003
IEEE
15 years 6 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
16 years 1 months ago
Scalable discovery of hidden emails from large folders
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge th...
Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou
IPPS
2006
IEEE
15 years 7 months ago
Lossless compression for large scale cluster logs
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM’s Blue Gene/L which can acc...
R. Balakrishnan, Ramendra K. Sahoo
SAC
2005
ACM
15 years 7 months ago
Mining concept associations for knowledge discovery in large textual databases
In this paper, we describe a new approach for mining concept associations from large text collections. The concepts are short sequences of words that occur frequently together acr...
Xiaowei Xu, Mutlu Mete, Nurcan Yuruk
IPPS
2007
IEEE
15 years 7 months ago
An Energy-Efficient Framework for Large-Scale Parallel Storage Systems
Huge energy consumption has become a critical bottleneck for further applying large-scale cluster systems to build new data centers. Among various components of a data center, sto...
Ziliang Zong, Matt Briggs, Nick O'Connor, Xiao Qin