Sciweavers

5423 search results - page 1065 / 1085
» Denial-of-service in automation systems
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
ISBI
2008
IEEE
14 years 9 months ago
Quantitative genetic modeling of lateral ventricular shape and volume using multi-atlas fluid image alignment in twins
Despite substantial progress in measuring the 3D profile of anatomical variations in the human brain, their genetic and environmental causes remain enigmatic. We developed an auto...
Yi-Yu Chou, Natasha Lepore, Marina Barysheva, Ming...
WWW
2007
ACM
14 years 9 months ago
Toward expressive syndication on the web
Syndication systems on the Web have attracted vast amounts of attention in recent years. As technologies have emerged and matured, there has been a transition to more expressive s...
Christian Halaschek-Wiener, James A. Hendler
WWW
2005
ACM
14 years 9 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
WWW
2005
ACM
14 years 9 months ago
Extracting context to improve accuracy for HTML content extraction
Web pages contain clutter (such as ads, unnecessary images and extraneous links) around the body of an article, which distracts a user from actual content. Extraction of "use...
Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo
« Prev « First page 1065 / 1085 Last » Next »