Sciweavers

361 search results - page 61 / 73
» Toward a Query Language for Network Attack Data
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 9 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
ICDE
2003
IEEE
209views Database» more  ICDE 2003»
14 years 9 months ago
An Evaluation of Regular Path Expressions with Qualifiers against XML Streams
This paper presents SPEX, a streamed and progressive evaluation of regular path expressions with XPath-like qualifiers against XML streams. SPEX proceeds as follows. An expression...
Dan Olteanu, François Bry, Tobias Kiesling
GEOINFO
2003
13 years 9 months ago
Integrating Telecom Outside Plant Systems through the GML Standard
This paper introduces the Telecommunication Outside Plant Markup Language (TOPML), an OpenGis GML (Geographic Markup Language) application schema designed to describe telecommunica...
Gerson Mizuta Weiss
JMLR
2012
11 years 10 months ago
On Nonparametric Guidance for Learning Autoencoder Representations
Unsupervised discovery of latent representations, in addition to being useful for density modeling, visualisation and exploratory data analysis, is also increasingly important for...
Jasper Snoek, Ryan Prescott Adams, Hugo Larochelle
IFIP
2004
Springer
14 years 1 months ago
Behavioural Equivalences for Dynamic Web Data
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...
Sergio Maffeis, Philippa Gardner