Sciweavers

6269 search results - page 1196 / 1254
» Turning data into knowledge
Sort
View
ACSAC
2008
IEEE
15 years 5 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
81
Voted
CCGRID
2008
IEEE
15 years 5 months ago
On the Optimization of Resource Utilization in Distributed Multimedia Applications
—The application and research area of Multimedia Content Analysis (MMCA) considers all aspects of the automated extraction of new knowledge from large multimedia data streams and...
R. Yang, Robert D. van der Mei, D. Roubos, Frank J...
100
Voted
ICDCS
2008
IEEE
15 years 5 months ago
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems
The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit the sequentia...
Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zho...
IV
2008
IEEE
296views Visualization» more  IV 2008»
15 years 5 months ago
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
Romain Bourqui, Fabien Jourdan
LCN
2008
IEEE
15 years 5 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
« Prev « First page 1196 / 1254 Last » Next »