Sciweavers

6907 search results - page 186 / 1382
» Securing distributed adaptation
Sort
View
83
Voted
SIGMOD
1999
ACM
107views Database» more  SIGMOD 1999»
15 years 2 months ago
Client-Site Query Extensions
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Tobias Mayr, Praveen Seshadri
82
Voted
ICSE
1999
IEEE-ACM
15 years 2 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
99
Voted
COLT
2006
Springer
15 years 2 months ago
Online Learning with Variable Stage Duration
We consider online learning in repeated decision problems, within the framework of a repeated game against an arbitrary opponent. For repeated matrix games, well known results esta...
Shie Mannor, Nahum Shimkin
109
Voted
INFOCOM
2000
IEEE
15 years 1 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
72
Voted
MASCOTS
2010
14 years 11 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...