scispace - formally typeset
Search or ask a question
Institution

Amazon.com

CompanySeattle, Washington, United States
About: Amazon.com is a company organization based out in Seattle, Washington, United States. It is known for research contribution in the topics: Computer science & Service (business). The organization has 13363 authors who have published 17317 publications receiving 266589 citations.


Papers
More filters
Patent
28 Sep 2010
TL;DR: In this paper, a content delivery network (CDN) service provider, on behalf of a content provider, can process domain name service (DNS) requests for resources by computing devices and resolve the DNS requests by the identification of a network address of a computing device that will provide the requested resources.
Abstract: Systems and methods for managing requesting routing functionality associated with resource requests for one or more resources associated with a content provider are provided. A content delivery network (“CDN”) service provider, on behalf of a content provider, can process domain name service (“DNS”) requests for resources by computing devices and resolve the DNS requests by the identification of a network address of a computing device that will provide the requested resources. Based on the processing of DNS queries initiated by a client computing device, the CDN service provider can measure CDN service provider latencies associated with the generation of DNS requests by network components associated with the client computing devices. Examples of the network components can include DNS resolvers associated with the client computing device.

81 citations

Patent
26 Oct 2010
TL;DR: In this article, a replicated database instance is provisioned that provides primary and secondary replicas that can be provisioned in different data zones or geographical locations, such that any failure or outage of the primary replica can be addressed by performing a failover operation to the secondary replica.
Abstract: A replicated database instance can be provisioned that provides primary and secondary replicas that can be provisioned in different data zones or geographical locations. The database can be installed on the primary replica, and both the primary and secondary replica can have installed a block level replication mechanism that allows any I/O operation to be replicated by between the primary and secondary replicas. Any failure or outage of the primary replica can be addressed by performing a failover operation to the secondary replica. A DNS name or other such approach can be used such that the name can be aliased to the secondary replica during a failover, such that there is no action needed on the part of the customer to utilize the "new" primary replica. The creation of the database and provisioning of the replicated instance can be initiated using a Web service call to a control environment.

81 citations

Proceedings ArticleDOI
01 Oct 2018
TL;DR: Comparisons of the performance for KDD-99 alternatives when trained using classification models commonly found in literature indicate that classifiers trained on UNSW-NB15 match or better the Weighted F1-Score of those trained on NSL-KDD and K DD-99 in the binary case, thus advocating UNSW -NB15 as a modern substitute to these datasets.
Abstract: Machine Learning has been steadily gaining traction for its use in Anomaly-based Network Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed using the KDD CUP 99 dataset as a benchmark. Several studies question its usability while constructing a contemporary NIDS, due to the skewed response distribution, non-stationarity, and failure to incorporate modern attacks. In this paper, we compare the performance for KDD-99 alternatives when trained using classification models commonly found in literature: Neural Network, Support Vector Machine, Decision Tree, Random Forest, Naive Bayes and K-Means. Applying the SMOTE oversampling technique and random undersampling, we create a balanced version of NSL-KDD and prove that skewed target classes in KDD-99 and NSL-KDD hamper the efficacy of classifiers on minority classes (U2R and R2L), leading to possible security risks. We explore UNSW-NB15, a modern substitute to KDD-99 with greater uniformity of pattern distribution. We benchmark this dataset before and after SMOTE oversampling to observe the effect on minority performance. Our results indicate that classifiers trained on UNSW-NB15 match or better the Weighted F1-Score of those trained on NSL-KDD and KDD-99 in the binary case, thus advocating UNSW-NB15 as a modern substitute to these datasets.

81 citations

Patent
14 Jan 2009
TL;DR: In this article, a system and method for electronically searching a personalized library of content includes, in at least one embodiment, receiving one or more search terms and automatically searching a text searchable database to produce search results.
Abstract: A system and method for electronically searching a personalized library of content includes, in at least one embodiment, receiving one or more search terms and electronically searching a text searchable database to produce search results. After receiving a search result selection, a page image in a page image database corresponding to the search result selection is identified. A substitute image of the identified page image is prepared, wherein a portion of the content in the identified page image is suppressed in the substitute image. The substitute image is then provided for computer display, wherein the one or more search terms in the substitute image are highlighted when the substitute image is displayed. The substitute image appears substantially the same as the identified page image except for the portion that is suppressed. Information identifying the location of the search terms in the substitute image may be provided for highlighting.

81 citations

Patent
06 Mar 2009
TL;DR: In this paper, a computer-implemented method is proposed to route service requests to services in a service framework provided by a plurality of hosts, based on measured latencies for the plurality of candidate hosts and routing the service request to the selected candidate host.
Abstract: A computer-implemented method routes service requests to services in a service framework provided by a plurality of hosts. The method comprises receiving a service request for a service in the service framework and discovering a plurality of candidate hosts that host the service. The plurality of candidate hosts are a subset of the plurality of hosts. The method further comprises selecting a candidate host from the plurality of candidate hosts based on measured latencies for the plurality of candidate hosts and routing the service request to the selected candidate host.

81 citations


Authors

Showing all 13498 results

NameH-indexPapersCitations
Jiawei Han1681233143427
Bernhard Schölkopf1481092149492
Christos Faloutsos12778977746
Alexander J. Smola122434110222
Rama Chellappa120103162865
William F. Laurance11847056464
Andrew McCallum11347278240
Michael J. Black11242951810
David Heckerman10948362668
Larry S. Davis10769349714
Chris M. Wood10279543076
Pietro Perona10241494870
Guido W. Imbens9735264430
W. Bruce Croft9742639918
Chunhua Shen9368137468
Network Information
Related Institutions (5)
Microsoft
86.9K papers, 4.1M citations

89% related

Google
39.8K papers, 2.1M citations

88% related

Carnegie Mellon University
104.3K papers, 5.9M citations

87% related

ETH Zurich
122.4K papers, 5.1M citations

82% related

University of Maryland, College Park
155.9K papers, 7.2M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
2022168
20212,015
20202,596
20192,002
20181,189