Sciweavers

4719 search results - page 885 / 944
» Applications = Components GLoo
Sort
View
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 3 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
14 years 3 months ago
1000 Trials: An empirically validated end effector that robustly grasps objects from the floor
—Unstructured, human environments present great challenges and opportunities for robotic manipulation and grasping. Robots that reliably grasp household objects with unknown or u...
Zhe Xu, Travis Deyle, Charles C. Kemp
INFOCOM
2009
IEEE
14 years 3 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...
INFOCOM
2009
IEEE
14 years 3 months ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang
ATAL
2009
Springer
14 years 3 months ago
Graph-based methods for the analysis of large-scale multiagent systems
Multiagent systems are often characterized by complex, and sometimes unpredictable interactions amongst their autonomous components. While these systems can provide robust and sca...
Wilbur Peng, William Krueger, Alexander Grushin, P...