Sciweavers

1291 search results - page 72 / 259
» Intrusion Detection for Distributed Applications
Sort
View
IEEEARES
2009
IEEE
15 years 9 months ago
Perfect Failure Detection in the Partitioned Synchronous Distributed System Model
—In this paper we show that it is possible to implement a perfect failure detector P (one that detects all faulty processes if and only if those processes failed) in a non-synchr...
Raimundo José de Araújo Macêdo...
117
Voted
IJCNN
2006
IEEE
15 years 8 months ago
Data Fusion for Outlier Detection through Pseudo-ROC Curves and Rank Distributions
— This paper proposes a novel method of fusing models for classification of unbalanced data. The unbalanced data contains a majority of healthy (negative) instances, and a minor...
Paul F. Evangelista, Mark J. Embrechts, Boleslaw K...
124
Voted
USENIX
2008
15 years 4 months ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
109
Voted
AINA
2007
IEEE
15 years 9 months ago
Geo-Linda: a Geometry Aware Distributed Tuple Space
This paper presents Geo-Linda, a physically distributed tuple space. Geo-Linda targets ubiquitous computing applications involving the detection of movement patterns of objects an...
Julien Pauty, Paul Couderc, Michel Banâtre, ...
127
Voted
SAC
2008
ACM
15 years 2 months ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....