The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
This paper introduces a new data structure, called V-trees, designed to store long sequences of points in 2D space and yet allow efficient access to their fragments. They also opt...
A growing number of online service providers offer to store customers' photos, email, file system backups, and other digital assets. Currently, customers cannot make informed...
Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram S...
We study generalized fixed-point equations over idempotent semirings and provide an efficient algorithm for the detection whether a sequence of Kleene's iterations stabilizes ...
This paper proposes an open, extensible control plane for a global event service, based on semantically rich messages. This is based on the novel application of control plane separ...
David Lewis, John Keeney, Declan O'Sullivan, Song ...