Sciweavers

8770 search results - page 1545 / 1754
» Named Service Networking
Sort
View
RAID
2000
Springer
15 years 2 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
VLDB
1995
ACM
179views Database» more  VLDB 1995»
15 years 2 months ago
The ClustRa Telecom Database: High Availability, High Throughput, and Real-Time Response
New telecommunication services and mobility networks have introduced databases in telecommunication networks. Compared with traditional use of databases, telecom databases must fu...
Svein-Olaf Hvasshovd, Øystein Torbjø...
SIGCOMM
1991
ACM
15 years 2 months ago
Efficient and Robust Policy Routing Using Multiple Hierarchical Addresses
One of the most compelling long term problems facing the IP and emerging 0S1 Internet is growth, At the same time, policy routing-the ability of a packet source to determine the t...
Paul F. Tsuchiya
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
15 years 1 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
DSN
2005
IEEE
15 years 1 months ago
Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems
In general, decision support is one of the main purposes of model-based analysis of systems. Response surface methodology (RSM) is an optimization technique that has been applied ...
Peter Kemper, Dennis Müller, Axel Thümml...
« Prev « First page 1545 / 1754 Last » Next »