We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Decision-support applications in emerging environments require that SQL query results or intermediate results be shipped to clients for further analysis and presentation. These cl...
Eye tracking experiments have shown that titles of Web search results play a crucial role in guiding a user’s search process. We present a machine-learned algorithm that trains ...
Tapas Kanungo, Nadia Ghamrawi, Ki Yuen Kim, Lawren...
After developing a model free table recognition system we wanted to tune parameters in order to optimize the recognition performance. Therefore we developed a benchmarking environ...
— We consider the problem of processing exact results for sliding window joins over data streams with limited memory. Existing approaches deal with memory limitations by shedding...