Sciweavers

587 search results - page 114 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
ICNP
2000
IEEE
14 years 4 days ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
CVPR
2006
IEEE
14 years 1 months ago
Automatic Landmark Tracking and its Application to the Optimization of Brain Conformal Mapping
Anatomical features on cortical surfaces are usually represented by landmark curves, called sulci/gyri curves. These landmark curves are important information for neuroscientists ...
Lok Ming Lui, Yalin Wang, Tony F. Chan, Paul M. Th...
SAC
2006
ACM
14 years 1 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
BMCBI
2007
152views more  BMCBI 2007»
13 years 7 months ago
Bioinformatic identification of novel putative photoreceptor specific cis-elements
Background: Cell specific gene expression is largely regulated by different combinations of transcription factors that bind cis-elements in the upstream promoter sequence. However...
Charles G. Danko, Vera A. McIlvain, Maochun Qin, B...
SDM
2012
SIAM
252views Data Mining» more  SDM 2012»
11 years 10 months ago
Learning from Heterogeneous Sources via Gradient Boosting Consensus
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...
Xiaoxiao Shi, Jean-François Paiement, David...