Sciweavers

433 search results - page 28 / 87
» Consistency in a Stream Warehouse
Sort
View
MYCRYPT
2005
Springer
187views Cryptology» more  MYCRYPT 2005»
14 years 4 months ago
Distinguishing Attacks on T-Functions
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function an...
Simon Künzli 0002, Pascal Junod, Willi Meier
RAID
2009
Springer
14 years 5 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
PODS
2007
ACM
225views Database» more  PODS 2007»
14 years 11 months ago
Sketching unaggregated data streams for subpopulation-size queries
IP packet streams consist of multiple interleaving IP flows. Statistical summaries of these streams, collected for different measurement periods, are used for characterization of ...
Edith Cohen, Nick G. Duffield, Haim Kaplan, Carste...
DELOS
2007
14 years 11 days ago
Integration of Reliable Sensor Data Stream Management into Digital Libraries
Data Stream Management (DSM) addresses the continuous processing of sensor data. DSM requires the combination of stream operators, which may run on different distributed devices, ...
Gert Brettlecker, Heiko Schuldt, Peter M. Fischer,...
JCIT
2007
190views more  JCIT 2007»
13 years 10 months ago
A Two-layer Super-Peer based P2P Live Media Streaming System
Peer-to-peer (P2P) file sharing has become increasingly popular, accounting for as much as 70% of Internet traffic by some estimates. Recently, we have been witnessing the emergen...
Poo Kuan Hoong, Hiroshi Matsuo