Sciweavers

502 search results - page 86 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
USENIX
2008
13 years 10 months ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
ICRA
2006
IEEE
125views Robotics» more  ICRA 2006»
14 years 1 months ago
An Ecological Approach to Odour Recognition in Intelligent Environments
— We present a new approach for odour detection and recognition based on a so-called PEIS-Ecology: a network of gas sensors and a mobile robot are integrated in an intelligent en...
Mathias Broxvall, Silvia Coradeschi, Amy Loutfi, A...
COMPLEX
2009
Springer
14 years 2 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu
IJCNN
2006
IEEE
14 years 1 months ago
Training Coordination Proxy Agents
— Delegating the coordination role to proxy agents can improve the overall outcome of the task at the expense of cognitive overload due to switching subtasks. Stability and commi...
Myriam Abramson, William Chao, Ranjeev Mittu
BMCBI
2006
98views more  BMCBI 2006»
13 years 7 months ago
JLIN: A java based linkage disequilibrium plotter
Background: A great deal of effort and expense are being expended internationally in attempts to detect genetic polymorphisms contributing to susceptibility to complex human disea...
Kim W. Carter, Pamela A. McCaskie, Lyle J. Palmer