Abstract. In this paper, we propose a mechanism to eliminate the performance anomaly of IEEE 802.11b. Performance anomaly happens when nodes that have different transmission rates...
A warehouse is a repository of integrated information drawn from remote data sources. Since a warehouse e ectively implements materialized views, we must maintain the views as the...
Yue Zhuge, Hector Garcia-Molina, Joachim Hammer, J...
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
This paper presents a new method of interactive refinement of a knowledge base. The first step of our method is a validation stage which checks the consistency and the completenes...