Sciweavers

200 search results - page 34 / 40
» Symbolic Equivalences for Open Systems
Sort
View
EUROSEC
2010
ACM
14 years 28 days ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
KR
1992
Springer
13 years 11 months ago
Embedding Defaults into Terminological Knowledge Representation Formalisms
Abstract, We consider the problem of integrating Reiter's default logic into terminological representation systems. It turns out that such an integration is less straightforwa...
Franz Baader, Bernhard Hollunder
HOTSWUP
2009
ACM
13 years 11 months ago
Efficient Systematic Testing for Dynamically Updatable Software
Recent years have seen significant advances in dynamic software updating (DSU) systems, which allow programs to be patched on the fly. However, a significant challenge remains: Ho...
Christopher M. Hayden, Eric A. Hardisty, Michael W...
CN
2007
121views more  CN 2007»
13 years 7 months ago
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport
—Interactivity in the transport protocol can greatly benefit transport friendly applications generating streaming traffic. Recently we have developed iTCP, which can provide even...
Javed I. Khan, Raid Zaghal
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
13 years 5 months ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali