In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...
Existing distributed middleware technologies and Enterprise Application frameworks lack in support to service flexibility from both the developer’s and user’s point of view. ...
Domenico Cotroneo, Cristiano di Flora, Stefano Rus...
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...
We address the problem of making online, parallel query plans fault-tolerant: i.e., provide intra-query fault-tolerance without blocking. We develop an approach that not only achi...