Sciweavers

2421 search results - page 343 / 485
» Message from the Co-Chairs
Sort
View
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
14 years 3 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley
IEEESCC
2008
IEEE
14 years 3 months ago
Byzantine Fault Tolerant Coordination for Web Services Business Activities
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to miti...
Wenbing Zhao, Honglei Zhang
CSFW
2007
IEEE
14 years 3 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
IEEESCC
2007
IEEE
14 years 3 months ago
Governance of Cross-Organizational Service Agreements: A Policy-Based Approach
Many real-life organizations are hierarchies of largely autonomous, heterogeneous members (individuals or other organizations), often exhibiting rich policies. We restrict our att...
Yathiraj B. Udupi, Munindar P. Singh
INFOCOM
2007
IEEE
14 years 3 months ago
How Optimal are Wireless Scheduling Protocols?
— In wireless networks mutual interference impairs the quality of received signals and might even prevent the correct reception of messages. It is therefore of paramount importan...
Thomas Moscibroda, Yvonne Anne Oswald, Roger Watte...