Sciweavers

2517 search results - page 218 / 504
» Secure Deployment of Components
Sort
View
ISI
2008
Springer
15 years 4 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
ISI
2008
Springer
15 years 4 months ago
Improving quality and performance of schema matching in large scale
ABSTRACT. Schema matching is a crucial task to gather information of the same domain. However, this process is still largely performed manually or semi-automatically, discouraging ...
Fabien Duchateau, Zohra Bellahsene, Mathieu Roche
NETWORK
2008
151views more  NETWORK 2008»
15 years 4 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis
ISI
2008
Springer
15 years 2 months ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
CLOUDCOM
2010
Springer
15 years 2 months ago
Attaching Cloud Storage to a Campus Grid Using Parrot, Chirp, and Hadoop
The Hadoop filesystem is a large scale distributed filesystem used to manage and quickly process extremely large data sets. We want to utilize Hadoop to assist with dataintensive ...
Patrick Donnelly, Peter Bui, Douglas Thain