Sciweavers

197 search results - page 19 / 40
» Assessing Databases in .NET - Comparing Approaches
Sort
View
ACMSE
2005
ACM
14 years 1 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
CVPR
2000
IEEE
14 years 9 months ago
Robust and Efficient Skeletal Graphs
There has recently been significant interest in using repions based on abstractions of Blum's skeleton into a graph, for qualitative shape matching. The application of these ...
Pavel Dimitrov, Carlos Phillips, Kaleem Siddiqi
SIGMETRICS
2010
ACM
215views Hardware» more  SIGMETRICS 2010»
13 years 6 months ago
Quantifying the sustainability impact of data center availability
Data center availability is critical considering the explosive growth in Internet services and people’s dependence on them. Furthermore, in recent years, sustainability has beco...
Manish Marwah, Paulo Romero Martins Maciel, Amip S...
SIGMOD
2012
ACM
242views Database» more  SIGMOD 2012»
11 years 10 months ago
Dynamic management of resources and workloads for RDBMS in cloud: a control-theoretic approach
As cloud computing environments become explosively popular, dealing with unpredictable changes, uncertainties, and disturbances in both systems and environments turns out to be on...
Pengcheng Xiong
PODS
2009
ACM
134views Database» more  PODS 2009»
14 years 8 months ago
An efficient rigorous approach for identifying statistically significant frequent itemsets
As advances in technology allow for the collection, storage, and analysis of vast amounts of data, the task of screening and assessing the significance of discovered patterns is b...
Adam Kirsch, Michael Mitzenmacher, Andrea Pietraca...