Sciweavers

1244 search results - page 226 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
136
Voted
NSDI
2007
15 years 6 months ago
Black-box and Gray-box Strategies for Virtual Machine Migration
Virtualization can provide significant benefits in data centers by enabling virtual machine migration to eliminate hotspots. We present Sandpiper, a system that automates the ta...
Timothy Wood, Prashant J. Shenoy, Arun Venkatarama...
ICNP
2000
IEEE
15 years 8 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
141
Voted
TKDE
2008
178views more  TKDE 2008»
15 years 3 months ago
Efficient Similarity Search over Future Stream Time Series
With the advance of hardware and communication technologies, stream time series is gaining ever-increasing attention due to its importance in many applications such as financial da...
Xiang Lian, Lei Chen 0002
DSOM
2006
Springer
15 years 7 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
142
Voted
SSD
2009
Springer
145views Database» more  SSD 2009»
15 years 10 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...