Sciweavers

2006 search results - page 366 / 402
» Testing with Respect to Concerns
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
CHI
2003
ACM
14 years 9 months ago
The digital set-top box as a virtual channel provider
This research is based on the realization that the desktop computing paradigm is not appropriate for television, because it is adapted to fundamentally different user aspirations ...
Konstantinos Chorianopoulos
CHI
2001
ACM
14 years 9 months ago
Ignoring perfect knowledge in-the-world for imperfect knowledge in-the-head
Constraints and dependencies among the elements of embodied cognition form patterns or microstrategies of interactive behavior. Hard constraints determine which microstrategies ar...
Wayne D. Gray, Wai-Tat Fu
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
14 years 9 months ago
An XML transaction processing benchmark
XML database functionality has been emerging in "XML-only" databases as well as in the major relational database products. Yet, there is no industry standard XML databas...
Matthias Nicola, Irina Kogan, Berni Schiefer
EUROSYS
2009
ACM
14 years 5 months ago
Transparent checkpoints of closed distributed systems in Emulab
Emulab is a testbed for networked and distributed systems experimentation. Two guiding principles of its design are realism and control of experimentation. There is an inherent te...
Anton Burtsev, Prashanth Radhakrishnan, Mike Hible...