Sciweavers

64 search results - page 10 / 13
» An Empirical Study of Denial of Service Mitigation Technique...
Sort
View
EIS
2011
290views ECommerce» more  EIS 2011»
13 years 3 months ago
Code query by example
Most software engineering techniques that deal with software products customization are based on anticipation: The software designer has to foresee, somehow, the future needs for ...
Sebastien Vaucouleur
SDM
2008
SIAM
147views Data Mining» more  SDM 2008»
13 years 10 months ago
The Asymmetric Approximate Anytime Join: A New Primitive with Applications to Data Mining
It has long been noted that many data mining algorithms can be built on top of join algorithms. This has lead to a wealth of recent work on efficiently supporting such joins with ...
Lexiang Ye, Xiaoyue Wang, Dragomir Yankov, Eamonn ...
ICWS
2010
IEEE
13 years 7 months ago
Towards Improved Data Dissemination of Publish-Subscribe Systems
—with the proliferation of internet technologies, publish/subscribe systems have gained wide usage as a middleware. However for this model, catering large number of publishers an...
Ramith Jayasinghe, Dinesh Gamage, Srinath Perera
QEST
2007
IEEE
14 years 2 months ago
A business-oriented load dispatching framework for online auction sites
Online auction sites have unique workloads and user behavior characteristics that do not exist in other e-commerce sites. Earlier studies by the authors identified i) significan...
Daniel A. Menascé, Vasudeva Akula
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 8 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...