Sciweavers

1973 search results - page 241 / 395
» Network Performance Assessment for Neurofuzzy Data Modelling
Sort
View
CCR
2010
202views more  CCR 2010»
15 years 4 months ago
Understanding data center traffic characteristics
As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. In th...
Theophilus Benson, Ashok Anand, Aditya Akella, Min...
RAID
2005
Springer
15 years 9 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
CCS
2009
ACM
15 years 10 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
16 years 1 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
15 years 10 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao