Sciweavers

995 search results - page 28 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
ECIR
2004
Springer
13 years 8 months ago
Performance Analysis of Distributed Architectures to Index One Terabyte of Text
We simulate different architectures of a distributed Information Retrieval system on a very large Web collection, in order to work out the optimal setting for a particular set of r...
Fidel Cacheda, Vassilis Plachouras, Iadh Ounis
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
14 years 7 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
TSMC
2002
114views more  TSMC 2002»
13 years 7 months ago
Exploiting design information to derive object distribution models
Object-orientation and distributed systems are quickly becoming norms for new system development, generating renewed interest in distribution schemes traditionally directed at rela...
Sandeep Purao, Hemant K. Jain, Derek L. Nazareth
WORM
2003
13 years 8 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
SUM
2010
Springer
13 years 5 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller