Sciweavers

1816 search results - page 290 / 364
» Trace oblivious computation
Sort
View
RAID
2004
Springer
14 years 2 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
ICDS
2010
IEEE
14 years 2 months ago
Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework
Abstract—Recently, two complementary approaches are proposed to represent, model and analyze laws: the Nomos and VLPM approaches. Nomos is a goal-oriented approach to effectively...
Adolfo Villafiorita, Komminist Weldemariam, Angelo...
DISCEX
2003
IEEE
14 years 2 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
ICNP
2003
IEEE
14 years 2 months ago
Resilient Peer-to-Peer Streaming
We consider the problem of distributing “live” streaming media content to a potentially large and highly dynamic population of hosts. Peer-to-peer content distribution is attr...
Venkata N. Padmanabhan, Helen J. Wang, Philip A. C...
HT
2003
ACM
14 years 2 months ago
Which semantic web?
Through scenarios in the popular press and technical papers in the research literature, the promise of the Semantic Web has raised a number of different expectations. These expect...
Catherine C. Marshall, Frank M. Shipman III