Sciweavers

765 search results - page 141 / 153
» Detecting Anomalies and Intruders
Sort
View
AINA
2010
IEEE
14 years 14 days ago
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
— Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly incr...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca
DASFAA
1999
IEEE
118views Database» more  DASFAA 1999»
13 years 11 months ago
Materialized View Maintenance Using Version Numbers
A data warehouse stores materialized views over data from one or more sources in order to provide fast access to the integrated data, regardless of the availability of the data so...
Tok Wang Ling, Eng Koon Sze
VL
1996
IEEE
162views Visual Languages» more  VL 1996»
13 years 11 months ago
Interactive Authoring of Multimedia Documents
As multimedia applications spread widely, it is crucial for programming and design support systems to handle "time" in multimedia documents effectively and flexibly. This...
Junehwa Song, Michelle Y. Kim, G. Ramalingam, Raym...
CONEXT
2007
ACM
13 years 11 months ago
Can active tracking of inroamer location optimise a live GSM network?
The mobile communication industry has experienced huge growth in recent years, which amplified the competition among telecommunication companies. This inspired the search for new ...
Katerina Dufková, Jirí Danihelka, Mi...
ICANN
2007
Springer
13 years 11 months ago
Topology Aware Internet Traffic Forecasting Using Neural Networks
Forecasting Internet traffic is receiving an increasing attention from the computer networks domain. Indeed, by improving this task efficient traffic engineering and anomaly detect...
Paulo Cortez, Miguel Rio, Pedro Sousa, Miguel Roch...