Sciweavers

359 search results - page 37 / 72
» Autonomous Computing Systems: A Proposed Roadmap
Sort
View
113
Voted
BMVC
2000
15 years 4 months ago
Morphological Change Detection Algorithms for Surveillance Applications
Vision-based systems for remote surveillance usually involve change detection algorithms for intruders, obstacles or irregularities detection. In particular, there is a potentiall...
Elena Stringa
143
Voted
JCIT
2010
158views more  JCIT 2010»
14 years 10 months ago
A Flexible Grid Task Scheduling Algorithm Based on QoS Similarity
s In grid computing, the goals of task scheduling is to achieve high system optimization performance while matching multi-dimension Quiality of Service(QoS) requirement of applicat...
Kunfang Song, Shufen Ruan, Minghua Jiang
129
Voted
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
15 years 5 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
145
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 3 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
139
Voted
CF
2005
ACM
15 years 5 months ago
Owl: next generation system monitoring
As microarchitectural and system complexity grows, comprehending system behavior becomes increasingly difficult, and often requires obtaining and sifting through voluminous event ...
Martin Schulz, Brian S. White, Sally A. McKee, Hsi...