Sciweavers

391 search results - page 40 / 79
» Common Time Reference for Interactive Multimedia Application...
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 7 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
LISA
2008
13 years 10 months ago
Automatic Software Fault Diagnosis by Exploiting Application Signatures
Application problem diagnosis in complex enterprise environments is a challenging problem, and contributes significantly to the growth in IT management costs. While application pr...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
SC
2004
ACM
14 years 1 months ago
Big Wins with Small Application-Aware Caches
Large datasets, on the order of GB and TB, are increasingly common as abundant computational resources allow practitioners to collect, produce and store data at higher rates. As d...
Julio C. López, David R. O'Hallaron, Tianka...
NSDI
2007
13 years 10 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
ICDE
1994
IEEE
135views Database» more  ICDE 1994»
13 years 12 months ago
QBISM: Extending a DBMS to Support 3D Medical Images
We describe the design and implementation of QBISM (Query By Interactive, Spatial Multimedia), a prototype for querying and visualizing 3D spatial data. Our first application is i...
Manish Arya, William F. Cody, Christos Faloutsos, ...