Sciweavers

420 search results - page 63 / 84
» A case for run-time adaptation in packet processing systems
Sort
View
ASIAMS
2008
IEEE
14 years 1 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
CN
2007
148views more  CN 2007»
13 years 7 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
CIIA
2009
13 years 8 months ago
Appling A Discrete Particle Swarm Optimization Algorithm to Database Vertical Partition
Vertical partition is an important technique in database design used to enhance performance in database systems. Vertical fragmentation is a combinatorial optimization problem that...
Bilal Benmessahel, Mohamed Touahria
EDBT
2012
ACM
266views Database» more  EDBT 2012»
11 years 9 months ago
Stormy: an elastic and highly available streaming service in the cloud
In recent years, new highly scalable storage systems have significantly contributed to the success of Cloud Computing. Systems like Dynamo or Bigtable have underpinned their abil...
Simon Loesing, Martin Hentschel, Tim Kraska, Donal...
CN
2007
168views more  CN 2007»
13 years 7 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park