no code implementations • 27 Mar 2019 • Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao
Recent advances in artificial intelligence and the increasing need for powerful defensive measures in the domain of network security, have led to the adoption of deep learning approaches for use in network intrusion detection systems.
1 code implementation • 31 Oct 2018 • Ankur Sharma, Felix Martin Schuhknecht, Divya Agrawal, Jens Dittrich
This raises two questions: (1) Which conceptual similarities and differences do actually exist between a system such as Fabric and a classical distributed database system?
Distributed, Parallel, and Cluster Computing
no code implementations • 17 Jan 2018 • Ankur Sharma, Felix Martin Schuhknecht, Jens Dittrich
To simplify the configuration, industry grade DBMSs are usually shipped with various advisory tools, that provide recommendations for given workloads and machines.