Sciweavers

323 search results - page 60 / 65
» Alert Detection in System Logs
Sort
View
TDSC
2010
146views more  TDSC 2010»
13 years 2 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
ACSW
2006
13 years 8 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 18 days ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
ICIP
2009
IEEE
14 years 8 months ago
Facial Marks: Soft Biometric For Face Recognition
We propose to utilize micro features, namely facial marks (e.g., freckles, moles, and scars) to improve face recognition and retrieval performance. Facial marks can be used in thr...
WWW
2010
ACM
14 years 2 months ago
Exploring searcher interactions for distinguishing types of commercial intent
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein