University of Texas - Pan American

Displaying 1-5 of 5 results

  • White Papers // Jan 2014

    Anatomy of a Data Stream Management System

    In this paper, the authors identify issues and present solutions developed - both theoretical and experimental - during the course of developing a Data Stream Management System (DSMS) for applications in a sensor environment. Specifically, they summarize their solutions for CQ processing, trigger mechanisms, and Quality of Service (QoS) management...

    Provided By University of Texas - Pan American

  • White Papers // Jan 2014

    Packet Processing at Wire Speed Using Network Processors

    Recent developments in fiber optics and the new bandwidth hungry applications have put more stress on the active components (switches, routers etc.,) of a network. Optical fiber bandwidth is no longer a constraint for increasing the network bandwidth. However, the processing power of the network has not scaled up to...

    Provided By University of Texas - Pan American

  • White Papers // Aug 2012

    Digging Deeper Into Deep Web Databases by Breaking Through the Top-K Barrier

    A large number of web databases are only accessible through proprietary form-like interfaces which require users to query the system by entering desired values for a few attributes. A key restriction enforced by such an interface is the top-k output constraint - i.e., when there are a large number of...

    Provided By University of Texas - Pan American

  • White Papers // Nov 2007

    Nearest Neighbor Retrieval Using Distance-Based Hashing

    A method is proposed for indexing spaces with arbitrary distance measures, so as to achieve efficient approximate nearest neighbor retrieval. Hashing methods, such as Locality Sensitive Hashing (LSH), have been successfully applied for similarity indexing in vector spaces and string spaces under the Hamming distance. The key novelty of the...

    Provided By University of Texas - Pan American

  • White Papers // May 2006

    Cobra: Fine-grained Malware Analysis using Stealth Localized-executions

    Fine-grained code analysis in the context of malware is a complex and challenging task that provides insight into malware code-layers (polymorphic/metamorphic), its data encryption/ decryption engine, its memory layout etc., important pieces of information that can be used to detect and counter the malware and its variants. Current research in...

    Provided By University of Texas - Pan American

  • White Papers // Aug 2012

    Digging Deeper Into Deep Web Databases by Breaking Through the Top-K Barrier

    A large number of web databases are only accessible through proprietary form-like interfaces which require users to query the system by entering desired values for a few attributes. A key restriction enforced by such an interface is the top-k output constraint - i.e., when there are a large number of...

    Provided By University of Texas - Pan American

  • White Papers // Nov 2007

    Nearest Neighbor Retrieval Using Distance-Based Hashing

    A method is proposed for indexing spaces with arbitrary distance measures, so as to achieve efficient approximate nearest neighbor retrieval. Hashing methods, such as Locality Sensitive Hashing (LSH), have been successfully applied for similarity indexing in vector spaces and string spaces under the Hamming distance. The key novelty of the...

    Provided By University of Texas - Pan American

  • White Papers // May 2006

    Cobra: Fine-grained Malware Analysis using Stealth Localized-executions

    Fine-grained code analysis in the context of malware is a complex and challenging task that provides insight into malware code-layers (polymorphic/metamorphic), its data encryption/ decryption engine, its memory layout etc., important pieces of information that can be used to detect and counter the malware and its variants. Current research in...

    Provided By University of Texas - Pan American

  • White Papers // Jan 2014

    Anatomy of a Data Stream Management System

    In this paper, the authors identify issues and present solutions developed - both theoretical and experimental - during the course of developing a Data Stream Management System (DSMS) for applications in a sensor environment. Specifically, they summarize their solutions for CQ processing, trigger mechanisms, and Quality of Service (QoS) management...

    Provided By University of Texas - Pan American

  • White Papers // Jan 2014

    Packet Processing at Wire Speed Using Network Processors

    Recent developments in fiber optics and the new bandwidth hungry applications have put more stress on the active components (switches, routers etc.,) of a network. Optical fiber bandwidth is no longer a constraint for increasing the network bandwidth. However, the processing power of the network has not scaled up to...

    Provided By University of Texas - Pan American