Sciweavers

2444 search results - page 472 / 489
» A Pattern Based Data Mining Approach
Sort
View
LCN
2008
IEEE
14 years 3 months ago
Range queries and load balancing in a hierarchically structured P2P system
—Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, a...
Simon Rieche, Bui The Vinh, Klaus Wehrle
CCGRID
2006
IEEE
14 years 2 months ago
Network Bandwidth Predictor (NBP): A System for Online Network performance Forecasting
The applicability of network-based computing depends on the availability of the underlying network bandwidth. However, network resources are shared and the available network bandw...
Alaknantha Eswaradass, Xian-He Sun, Ming Wu
SRDS
2006
IEEE
14 years 2 months ago
Consistent Replication of Multithreaded Distributed Objects
Determinism is mandatory for replicating distributed objects with strict consistency guarantees. Multithreaded execution of method invocations is a source of nondeterminism, but h...
Hans P. Reiser, Jörg Domaschka, Franz J. Hauc...
ICAPR
2005
Springer
14 years 2 months ago
3D Action Modeling and Reconstruction for 2D Human Body Tracking
In this paper we present a technique for predicting the 2D human body joints and limbs position in monocular image sequences, and reconstructing its corresponding 3D postures using...
Ignasi Rius, Daniel Rowe, Jordi Gonzàlez, F...
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman