Sciweavers

198 search results - page 35 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
VLDB
2007
ACM
190views Database» more  VLDB 2007»
14 years 7 months ago
Request Window: an Approach to Improve Throughput of RDBMS-based Data Integration System by Utilizing Data Sharing Across Concur
This paper focuses on the problem of improving distributed query throughput of the RDBMS-based data integration system that has to inherit the query execution model of the underly...
Rubao Lee, Minghong Zhou, Huaming Liao
NOMS
2008
IEEE
14 years 1 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
OSDI
2004
ACM
14 years 7 months ago
FUSE: Lightweight Guaranteed Distributed Failure Notification
FUSE is a lightweight failure notification service for building distributed systems. Distributed systems built with FUSE are guaranteed that failure notifications never fail. When...
John Dunagan, Nicholas J. A. Harvey, Michael B. Jo...
WIMOB
2007
IEEE
14 years 1 months ago
Performance Analysis of Ranging Process in IEEE 802.16e OFDMA Systems
In this paper, ranging process in IEEE 802.16e OFDMA systems is analyzed and performance is evaluated. Ranging process provides initial network entry, uplink synchronization, and ...
Doo Hwan Lee, Hiroyuki Morikawa
IPPS
2008
IEEE
14 years 1 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...