Sciweavers

2585 search results - page 414 / 517
» computer 1999
Sort
View
RAID
2004
Springer
14 years 3 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
14 years 2 months ago
Pricing strategies on the Web: evidence from the online book industry
Using data collected between August 1999 and January 2000, we examine firm-level pricing strategies for 32 online bookstores. The data cover more than 300 books, including New Yor...
Karen Clay, Ramayya Krishnan, Eric Wolff
CODES
1999
IEEE
14 years 2 months ago
Software controlled power management
Reducing power consumption is critical in many system designs. Dynamic power management is an effective approach to decrease power without significantly degrading performance. Pow...
Yung-Hsiang Lu, Tajana Simunic, Giovanni De Michel...
CANDC
1999
ACM
14 years 2 months ago
A framework that supports collective creativity in design using visual images
The goal of our research is to develop computer systems that support designers’ collective creativity; such systems support individual creative aspects in design through the use...
Kumiyo Nakakoji, Yasuhiro Yamamoto, Masao Ohira
CSFW
1999
IEEE
14 years 2 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider