Results 41 to 50 of about 7,837 (220)

A solution for secure use of Kibana and Elasticsearch in multi-user environment

open access: yes, 2017
Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CC-IN2P3, CERN, and also non-HEP communities.
Nakamura, Tomoaki   +3 more
core   +1 more source

Multimedia big data computing for in-depth event analysis [PDF]

open access: yes, 2015
While the most part of ”big data” systems target text-based analytics, multimedia data, which makes up about 2/3 of internet traffic, provide unprecedented opportunities for understanding and responding to real world situations and challenges ...
Ayguadé Parra, Eduard   +2 more
core   +1 more source

Evaluation of the ATLAS model for remote access to database resident information for LHC Run 3 [PDF]

open access: yesEPJ Web of Conferences, 2020
The ATLAS model for remote access to database resident information relies upon a limited set of dedicated and distributed Oracle database repositories complemented with the deployment of Frontier system infrastructure on the WLCG (Worldwide LHC Computing
Gallas Elizabeth J, Dimitrov Gancho
doaj   +1 more source

E-commerce Personalization with Elasticsearch

open access: yesProcedia Computer Science, 2019
Abstract Personalization techniques are constantly gaining traction among e-commerce retailers, since major advancements have been made at research level and the benefits are clear and pertinent. However, effectively applying personalization in real life is a challenging task, since the proper mixture of technology, data and content is complex and ...
Konstantinos N. Vavliakis   +2 more
openaire   +1 more source

DNS tunneling Detection Using Elasticsearch

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Abstract Domain Name System (DNS) Protocol is a popular medium used by malware to perform ‘command and control’ in taking over victim’s computer, this technique called as DNS tunneling. Moreover, DNS tunneling can also be used to bypass captive portal hotspot in public places and worsen the network quality.
A F Sani, M A Setiawan
openaire   +1 more source

Scalable and Multifaceted Search and Its Application for Binary Malware Files

open access: yesIEEE Access, 2021
Malicious binary files are a serious threat to industrial information systems. Because of their large number, an automatic assistant tool becomes essential for analysis, and finding similar files would be a great help.
Donghoon Kim   +2 more
doaj   +1 more source

Faster Base64 Encoding and Decoding Using AVX2 Instructions [PDF]

open access: yes, 2018
Web developers use base64 formats to include images, fonts, sounds and other resources directly inside HTML, JavaScript, JSON and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of
Lemire, Daniel, Muła, Wojciech
core   +2 more sources

DESIGN AND IMPLEMENTATION OF AN INTELLIGENT SEARCH SYSTEM BASED ON NEURAL NETWORKS

open access: yesЕлектроніка та інформаційні технології
Background. In the digital information era, the ability to retrieve relevant data quickly and accurately is increasingly critical. Traditional search engines such as Google or Bing rely on keyword matching, which can fail in cases of vague queries ...
Vitalii Bozhovskiy, Halyna Klym
doaj   +1 more source

IMPLEMENTASI FULL TEXT SEARCH PADA SISTEM INFORMASI PERPUSTAKAAN MENGGUNAKAN LARAVEL

open access: yesJurnal Informatika dan Rekayasa Perangkat Lunak, 2019
Keberadaan suatu perpustakaan sekolah merupakan suatu hal yang sangat penting dan dibutuhkan dalam setiap sekolah. Karena pentingnya perpustakaan dalam sekolah tersebut maka perlu disediakan suatu sistem yang mampu mengelola berbagai kegiatan mengenai ...
Irham Asyhari, M. Subchan Mauludin
doaj   +1 more source

Proactive Empirical Assessment of New Language Feature Adoption via Automated Refactoring: The Case of Java 8 Default Methods

open access: yes, 2018
Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons.
Khatchadourian, Raffi   +1 more
core   +3 more sources

Home - About - Disclaimer - Privacy