Sciweavers

1347 search results - page 237 / 270
» Towards a Secure Data Stream Management System
Sort
View
CN
2007
106views more  CN 2007»
13 years 10 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
INEX
2007
Springer
14 years 4 months ago
Structured Document Retrieval, Multimedia Retrieval, and Entity Ranking Using PF/Tijah
CWI and University of Twente used PF/Tijah, a flexible XML retrieval system, to evaluate structured document retrieval, multimedia retrieval, and entity ranking tasks in the conte...
Theodora Tsikrika, Pavel Serdyukov, Henning Rode, ...
EEE
2004
IEEE
14 years 1 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
HOTOS
2003
IEEE
14 years 3 months ago
Palimpsest: Soft-Capacity Storage for Planetary-Scale Services
Distributed writable storage systems typically provide NFS-like semantics and unbounded persistence for files. We claim that for planetary-scale distributed services such facilit...
Timothy Roscoe, Steven Hand
PODS
2007
ACM
109views Database» more  PODS 2007»
14 years 10 months ago
What is "next" in event processing?
Event processing systems have wide applications ranging from managing events from RFID readers to monitoring RSS feeds. Consequently, there exists much work on them in the literat...
Walker M. White, Mirek Riedewald, Johannes Gehrke,...