Sciweavers

1636 search results - page 97 / 328
» Detecting similar software applications
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
Detection and resolution of atomicity violation in service composition
Atomicity is a desirable property that safeguards application consistency for service compositions. A service composition exhibiting this property could either complete or cancel ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
KBSE
2005
IEEE
15 years 10 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
BMCBI
2008
131views more  BMCBI 2008»
15 years 4 months ago
K-OPLS package: Kernel-based orthogonal projections to latent structures for prediction and interpretation in feature space
Background: Kernel-based classification and regression methods have been successfully applied to modelling a wide variety of biological data. The Kernel-based Orthogonal Projectio...
Max Bylesjö, Mattias Rantalainen, Jeremy K. N...
TOG
2008
236views more  TOG 2008»
15 years 4 months ago
Face swapping: automatically replacing faces in photographs
In this paper, we present a complete system for automatic face replacement in images. Our system uses a large library of face images created automatically by downloading images fr...
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Pete...
ANSS
2000
IEEE
15 years 9 months ago
Modeling and Analysis of Software Aging and Rejuvenation
Software systems are known to suffer from outages due to transient errors. Recently, the phenomenon of “software aging”, one in which the state of the software system degrades...
Kishor S. Trivedi, Kalyanaraman Vaidyanathan, Kate...