Sciweavers

1347 search results - page 175 / 270
» Towards a Secure Data Stream Management System
Sort
View
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 5 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
SACMAT
2003
ACM
15 years 10 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
ACSAC
2001
IEEE
15 years 8 months ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch
SIGCOMM
2012
ACM
13 years 7 months ago
TUBE: time-dependent pricing for mobile data
The two largest U.S. wireless ISPs have recently moved towards usage-based pricing to better manage the growing demand on their networks. Yet usage-based pricing still requires IS...
Sangtae Ha, Soumya Sen, Carlee Joe-Wong, Youngbin ...
WWW
2007
ACM
16 years 5 months ago
Towards multi-granularity multi-facet e-book retrieval
Generally speaking, digital libraries have multiple granularities of semantic units: book, chapter, page, paragraph and word. However, there are two limitations of current eBook r...
Chong Huang, YongHong Tian, Zhi Zhou, Tiejun Huang