Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
Abstract—Advancement and affordability is leading to popularity of plastic surgery procedures. Facial plastic surgery can be reconstructive to correct facial feature anomalies or...
Richa Singh, Mayank Vatsa, Himanshu S. Bhatt, Sama...
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
We introduce SelfTalk, a novel declarative language that allows users to query and understand the status of a large scale system. SelfTalk is sufficiently expressive to encode an ...