Sciweavers

912 search results - page 144 / 183
» Anomaly
Sort
View
MSS
2000
IEEE
106views Hardware» more  MSS 2000»
14 years 1 months ago
Disk Subsystem Performance Evaluation: From Disk Drives to Storage Area Networks
Disk subsystems span the range of configuration complexity from single disk drives to large installations of disk arrays. They can be directly attached to individual computer syst...
Thomas Ruwart
DASFAA
1999
IEEE
118views Database» more  DASFAA 1999»
14 years 1 months ago
Materialized View Maintenance Using Version Numbers
A data warehouse stores materialized views over data from one or more sources in order to provide fast access to the integrated data, regardless of the availability of the data so...
Tok Wang Ling, Eng Koon Sze
INFOVIS
1999
IEEE
14 years 1 months ago
Navigating Hierarchies with Structure-Based Brushes
Interactive selection is a critical component in exploratory visualization, allowing users to isolate subsets of the displayed information for highlighting, deleting, analysis, or...
Ying-Huey Fua, Matthew O. Ward, Elke A. Rundenstei...
NDSS
1999
IEEE
14 years 1 months ago
PGRIP: PNNI Global Routing Infrastructure Protection
We describe a system for achieving PNNI (Private Network-Network Interface) Global Routing Infrastructure Protection (PGRIP). We give details of PGRIP's system-level design a...
Sabrina De Capitani di Vimercati, Patrick Lincoln,...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 1 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok