Sciweavers

2135 search results - page 344 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
ICWSM
2008
13 years 10 months ago
Competing to Share Expertise: The Taskcn Knowledge Sharing Community
"Witkeys" are websites in China that form a rapidly growing web-based knowledge market. A user who posts a task also offers a small fee, and many other users submit thei...
Jiang Yang, Lada A. Adamic, Mark S. Ackerman
CIKM
2011
Springer
12 years 9 months ago
Joint inference for cross-document information extraction
Previous information extraction (IE) systems are typically organized as a pipeline architecture of separated stages which make independent local decisions. When the data grows bey...
Qi Li, Sam Anzaroot, Wen-Pin Lin, Xiang Li, Heng J...
DSN
2004
IEEE
14 years 1 months ago
FRTR: A Scalable Mechanism for Global Routing Table Consistency
This paper presents a scalable mechanism, Fast Routing Table Recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of...
Lan Wang, Daniel Massey, Keyur Patel, Lixia Zhang
RAID
2000
Springer
14 years 27 days ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
JSAC
2006
172views more  JSAC 2006»
13 years 9 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu