Sciweavers

1744 search results - page 203 / 349
» The Steganographic File System
Sort
View
139
Voted
IKE
2007
15 years 5 months ago
Bringing Information Retrieval Back To Database Management Systems
Information retrieval emerged as independent research area from traditional database management system more than a decade ago. This was driven by the increasing functional require...
Khaled Nagi
117
Voted
DIWEB
2004
15 years 5 months ago
Distributed Query Processing in P2P Systems with Incomplete Schema Information
The peer-to-peer (P2P) paradigm has emerged recently, mainly by file sharing systems like Napster or Gnutella and in terms of scalable distributed data structures. Because of the d...
Marcel Karnstedt, Katja Hose, Kai-Uwe Sattler
167
Voted
TSMC
2002
134views more  TSMC 2002»
15 years 3 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
OSDI
2008
ACM
16 years 4 months ago
CuriOS: Improving Reliability through Operating System Structure
An error that occurs in a microkernel operating system service can potentially result in state corruption and service failure. A simple restart of the failed service is not always...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
OSDI
2008
ACM
16 years 4 months ago
Mining Console Logs for Large-Scale System Problem Detection
The console logs generated by an application contain messages that the application developers believed would be useful in debugging or monitoring the application. Despite the ubiq...
Wei Xu, Ling Huang, Armando Fox, David A. Patterso...