Sciweavers

2269 search results - page 422 / 454
» Behavioral Intrusion Detection
Sort
View
PPOPP
2011
ACM
13 years 21 days ago
ScalaExtrap: trace-based communication extrapolation for spmd programs
Performance modeling for scientific applications is important for assessing potential application performance and systems procurement in high-performance computing (HPC). Recent ...
Xing Wu, Frank Mueller
DCOSS
2011
Springer
12 years 9 months ago
Group monitoring in mobile wireless sensor networks
—The need to monitor groups of mobile entities arises in many application contexts. Examples include the study of the social behavior of humans and wildlife, the shepherding of l...
Marco Cattani, Stefan Guna, Gian Pietro Picco
CAV
2012
Springer
236views Hardware» more  CAV 2012»
12 years 9 days ago
Lock Removal for Concurrent Trace Programs
Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computati...
Vineet Kahlon, Chao Wang
WWW
2008
ACM
14 years 10 months ago
Statistical properties of community structure in large social and information networks
A large body of work has been devoted to identifying community structure in networks. A community is often though of as a set of nodes that has more connections between its member...
Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, Mi...
POPL
2006
ACM
14 years 10 months ago
Harmless advice
This paper defines an object-oriented language with harmless aspect-oriented advice. A piece of harmless advice is a computation that, like ordinary aspect-oriented advice, execut...
Daniel S. Dantas, David Walker