Sciweavers

2858 search results - page 167 / 572
» Logics with Aggregate Operators
Sort
View
RAID
2007
Springer
14 years 4 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
SEMWEB
2004
Springer
14 years 3 months ago
A Semantic Approach for Designing E-Business Protocols
Abstract— Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, ...
Ashok U. Mallya, Munindar P. Singh
IMC
2003
ACM
14 years 3 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
AMW
2009
13 years 11 months ago
Consistent Query Answering in Data Warehouses
Abstract. A Data Warehouse (DW) is a data repository that organizes and physically integrates data from multiple sources under special kinds of schemas. A DW is composed by a set o...
Leopoldo E. Bertossi, Loreto Bravo, Mónica ...
JCP
2008
142views more  JCP 2008»
13 years 10 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun