Sciweavers

1661 search results - page 195 / 333
» Distributed Top-K Monitoring
Sort
View
MLDM
2007
Springer
14 years 5 months ago
Applying Frequent Sequence Mining to Identify Design Flaws in Enterprise Software Systems
In this paper we show how frequent sequence mining (FSM) can be applied to data produced by monitoring distributed enterprise applications. In particular we show how we applied FSM...
Trevor Parsons, John Murphy, Patrick O'Sullivan
RAID
2007
Springer
14 years 5 months ago
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
Abstract. In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addre...
Matthias Vallentin, Robin Sommer, Jason Lee, Craig...
AVSS
2006
IEEE
14 years 4 months ago
Fusion of Omnidirectional and PTZ Cameras for Accurate Cooperative Tracking
Dual camera systems (omnidirectional and slaved PTZ cameras) are widely used in public area monitoring and target tracking. However, due to their low and non-uniform resolution, o...
Yi Yao, Besma R. Abidi, Mongi A. Abidi
CCGRID
2006
IEEE
14 years 4 months ago
Actor Provenance Capture With Ganglia
Provenance is generally defined as the documentation of a process that leads to some result, and has long been recognised as being fundamental to the development of problem solvi...
Ian Wootten, Shrija Rajbhandari, Omer F. Rana, Jas...
DDECS
2006
IEEE
108views Hardware» more  DDECS 2006»
14 years 4 months ago
Impact of Shared Instruction Memory on Performance of FPGA-based MP-SoC Video Encoder
—The impact of shared instruction memory on performance is measured and analyzed for an FPGAbased Multiprocessor System-on-Chip (MP-SoC) with an MPEG-4 video encoding application...
Ari Kulmala, Erno Salminen, Olli Lehtoranta, Timo ...