We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Interconnect speeds currently surpass the abilities of today’s processors to satisfy their demands. The throughput rate provided by the network simply generates too much protoco...
This paper argues that simply applying a multipletree scheme does not provide sufficient fairness for applications in an Internet-scale distributed system, in terms of performance...