Sciweavers

2236 search results - page 326 / 448
» Intrusion detection techniques and approaches
Sort
View
SIGMOD
2004
ACM
122views Database» more  SIGMOD 2004»
14 years 9 months ago
Adapting to Source Properties in Processing Data Integration Queries
An effective query optimizer finds a query plan that exploits the characteristics of the source data. In data integration, little is known in advance about sources' propertie...
Zachary G. Ives, Alon Y. Halevy, Daniel S. Weld
IMC
2009
ACM
14 years 3 months ago
An analysis of packet sampling in the frequency domain
Packet sampling techniques introduce measurement errors that should be carefully handled in order to correctly characterize the network behavior. In the literature several works h...
Luigi Alfredo Grieco, Chadi Barakat
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 3 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
WOSS
2004
ACM
14 years 2 months ago
Design of self-managing dependable systems with UML and fault tolerance patterns
The development of dependable software systems is a costly undertaking. Fault tolerance techniques as well as self-repair capabilities usually result in additional system complexi...
Matthias Tichy, Daniela Schilling, Holger Giese
ICCV
1995
IEEE
14 years 25 days ago
Complete Scene Structure from Four Point Correspondences
A new technique is presented for computing 3D scene structure from point and line features in monocular image sequences. Unlike previous methods, the technique guarantees the comp...
Steven M. Seitz, Charles R. Dyer