Sciweavers

361 search results - page 21 / 73
» Toward a Query Language for Network Attack Data
Sort
View
ICASSP
2010
IEEE
13 years 5 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
IJCAI
2003
13 years 9 months ago
Querying Distributed Data through Distributed Ontologies: A Simple but Scalable Approach
In this paper, we define a simple but scalable framework for peer-to-peer data sharing systems, in which the problem of answering queries over a network of semantically related p...
François Goasdoué, Marie-Christine R...
EDBT
2000
ACM
13 years 11 months ago
A Data Model for Effectively Computable Functions
the research activities. This abstract is to introduce the approach of a data model - EP data model. Its data structure is able to store as a finite set of nodes arbitrary effectiv...
Kevin H. Xu
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
14 years 2 months ago
Query-Aware Sampling for Data Streams
Data Stream Management Systems are useful when large volumes of data need to be processed in real time. Examples include monitoring network traffic, monitoring financial transacti...
Theodore Johnson, S. Muthukrishnan, Vladislav Shka...
LCN
2007
IEEE
14 years 2 months ago
Towards Stateless Single-Packet IP Traceback
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...