Sciweavers

311 search results - page 61 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
The Cache Inference Problem and its Application to Content and Request Routing
— In many networked applications, independent caching agents cooperate by servicing each other’s miss streams, without revealing the operational details of the caching mechanis...
Nikolaos Laoutaris, Georgios Zervas, Azer Bestavro...
ISCA
2007
IEEE
217views Hardware» more  ISCA 2007»
13 years 7 months ago
Parallel Processing of High-Dimensional Remote Sensing Images Using Cluster Computer Architectures
Hyperspectral sensors represent the most advanced instruments currently available for remote sensing of the Earth. The high spatial and spectral resolution of the images supplied ...
David Valencia, Antonio Plaza, Pablo Martín...
MICCAI
2009
Springer
14 years 8 months ago
Using Real-Time fMRI to Control a Dynamical System by Brain Activity Classification
We present a method for controlling a dynamical system using real-time fMRI. The objective for the subject in the MR scanner is to balance an inverted pendulum by activating the le...
Anders Eklund, Henrik Ohlsson, Mats T. Andersson...
WS
2010
ACM
13 years 5 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
14 years 1 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...