Sciweavers

1456 search results - page 278 / 292
» Two Techniques to Improve Finite Model Search
Sort
View
180
Voted
SIGMOD
2008
ACM
161views Database» more  SIGMOD 2008»
16 years 18 days ago
Efficient pattern matching over event streams
Pattern matching over event streams is increasingly being employed in many areas including financial services, RFIDbased inventory management, click stream analysis, and electroni...
Jagrati Agrawal, Yanlei Diao, Daniel Gyllstrom, Ne...
102
Voted
LISA
2007
15 years 2 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
95
Voted
CN
2004
129views more  CN 2004»
15 years 9 days ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
122
Voted
BIBM
2010
IEEE
158views Bioinformatics» more  BIBM 2010»
14 years 10 months ago
Protein-protein interaction prediction via Collective Matrix Factorization
Abstract--Protein-protein interactions (PPI) play an important role in cellular processes and metabolic processes within a cell. An important task is to determine the existence of ...
Qian Xu, Evan Wei Xiang, Qiang Yang
134
Voted
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 4 months ago
Analytical Evaluation of Fractional Frequency Reuse for OFDMA Cellular Networks
Fractional frequency reuse (FFR) is an interference management technique well-suited to OFDMAbased cellular networks wherein the cells are partitioned into spatial regions with di...
Thomas David Novlan, Radha Krishna Ganti, Arunabha...