Sciweavers

2128 search results - page 335 / 426
» A general characterization of indulgence
Sort
View
IMC
2010
ACM
13 years 8 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
IMC
2010
ACM
13 years 8 months ago
Network traffic characteristics of data centers in the wild
Although there is tremendous interest in designing improved networks for data centers, very little is known about the network-level traffic characteristics of current data centers...
Theophilus Benson, Aditya Akella, David A. Maltz
POPL
2005
ACM
14 years 10 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
PODS
2008
ACM
155views Database» more  PODS 2008»
14 years 10 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
ICS
2007
Tsinghua U.
14 years 4 months ago
A study of process arrival patterns for MPI collective operations
Process arrival pattern, which denotes the timing when different processes arrive at an MPI collective operation, can have a significant impact on the performance of the operatio...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan