Atomicity is a desirable property that safeguards application consistency for service compositions. A service composition exhibiting this property could either complete or cancel ...
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Background: Kernel-based classification and regression methods have been successfully applied to modelling a wide variety of biological data. The Kernel-based Orthogonal Projectio...
In this paper, we present a complete system for automatic face replacement in images. Our system uses a large library of face images created automatically by downloading images fr...
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Pete...
Software systems are known to suffer from outages due to transient errors. Recently, the phenomenon of “software aging”, one in which the state of the software system degrades...
Kishor S. Trivedi, Kalyanaraman Vaidyanathan, Kate...