Sciweavers

371 search results - page 46 / 75
» Collective Error Detection for MPI Collective Operations
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
ISSA
2004
13 years 10 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
TRECVID
2008
13 years 10 months ago
LIG and LIRIS at TRECVID 2008: High Level Feature Extraction and Collaborative Annotation
This paper describes our participations of LIG and LIRIS to the TRECVID 2008 High Level Features detection task. We evaluated several fusion strategies and especially rank fusion....
ICRA
2000
IEEE
117views Robotics» more  ICRA 2000»
14 years 1 months ago
Practical Mobile Robot Self-Localization
A mapmaking robot integrates accumulated sensor data into a data structure that can be used for future localization or planning operations. Localization is the process of determin...
Jon Howell, Bruce Randall Donald
VEE
2006
ACM
102views Virtualization» more  VEE 2006»
14 years 2 months ago
A stackless runtime environment for a Pi-calculus
The Pi-calculus is a formalism to model and reason about highly concurrent and dynamic systems. Most of the expressive power of the language comes from the ability to pass communi...
Frédéric Peschanski, Samuel Hym