Sciweavers

1763 search results - page 294 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
111
Voted
RAID
2004
Springer
15 years 5 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
89
Voted
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 5 months ago
Consumers cognition towards communities: Customer-centred community design using the means-end chain perspective
This paper presents research on the application of the means-end chain (MEC) framework for investigating customers cognitive structure regarding community applications. It is argu...
Peter Aschmoneit, Mark Heitmann
104
Voted
SC
2003
ACM
15 years 5 months ago
Nondeterministic Queries in a Relational Grid Information Service
A Grid Information Service (GIS) stores information about the resources of a distributed computing environment and answers questions about it. We are developing RGIS, a GIS system...
Peter A. Dinda, Dong Lu
112
Voted
GRID
2003
Springer
15 years 5 months ago
Scoped and Approximate Queries in a Relational Grid Information Service
We are developing a grid information service, RGIS, that is based on the relational data model. RGIS supports complex queries written in SQL that search for compositions (using jo...
Dong Lu, Peter A. Dinda, Jason A. Skicewicz
103
Voted
EUROSYS
2010
ACM
15 years 5 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry