-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
Currently, the cDNA and genomic sequence projects are processing at such a rapid rate that more and more gene data become available. New methods are needed to efficiently and eff...
Motivated by many applications, top-k query is a fundamental operation in modern database systems. Technological advances have enabled the deployment of large-scale sensor networks...
Applications designed to execute on "computational grids" frequently require the simultaneous co-allocation of multiple resources in order to meet performance requiremen...
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...