Sciweavers

1291 search results - page 138 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SIGOPS
2010
80views more  SIGOPS 2010»
13 years 7 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
ICASSP
2009
IEEE
14 years 3 months ago
A framework for distributed multimedia stream mining systems using coalition-based foresighted strategies
In this paper, we propose a distributed solution to the problem of configuring classifier trees in distributed stream mining systems. The configuration involves selecting appro...
Hyunggon Park, Deepak S. Turaga, Olivier Verscheur...
AINA
2006
IEEE
14 years 3 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
CIKM
2009
Springer
14 years 25 days ago
Multidimensional routing indices for efficient distributed query processing
Traditional routing indices in peer-to-peer (P2P) networks are mainly designed for document retrieval applications and maintain aggregated one-dimensional values representing the ...
Christos Doulkeridis, Akrivi Vlachou, Kjetil N&osl...
CN
2007
104views more  CN 2007»
13 years 9 months ago
Managing feature interactions between distributed SIP call control services
The Session Initiation Protocol (SIP) is widely used as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shel...
Mario Kolberg, Evan H. Magill