Sciweavers

766 search results - page 44 / 154
» How to Read a Signature
Sort
View
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 11 months ago
Fa: A System for Automating Failure Diagnosis
Abstract-Failures of Internet services and enterprise systems lead to user dissatisfaction and considerable loss of revenue. Since manual diagnosis is often laborious and slow, the...
Songyun Duan, Shivnath Babu, Kamesh Munagala
ICDE
2010
IEEE
262views Database» more  ICDE 2010»
14 years 9 months ago
Approximate String Search in Spatial Databases
Abstract-- This work presents a novel index structure, MHRtree, for efficiently answering approximate string match queries in large spatial databases. The MHR-tree is based on the ...
Bin Yao, Feifei Li, Marios Hadjieleftheriou, Kun H...
EPIA
2003
Springer
14 years 3 months ago
Using CLIPS to Detect Network Intrusions
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Pedro Alípio, Paulo Carvalho, José N...
ESORICS
2009
Springer
14 years 10 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...