Sciweavers

1661 search results - page 288 / 333
» Distributed Top-K Monitoring
Sort
View
SIGMETRICS
2012
ACM
257views Hardware» more  SIGMETRICS 2012»
12 years 12 days ago
Fair sampling across network flow measurements
Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow [9], and completed flow records are sampled in...
Nick G. Duffield
TKDE
2012
487views Formal Methods» more  TKDE 2012»
12 years 11 days ago
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
—Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of som...
Rajeev Gupta, Krithi Ramamritham
ICPR
2006
IEEE
14 years 11 months ago
Recognizing Facial Expressions by Tracking Feature Shapes
Reliable facial expression recognition by machine is still a challenging task. We propose a framework to recognise various expressions by tracking facial features. Our method uses...
Atul Kanaujia, Dimitris N. Metaxas
HPCA
2009
IEEE
14 years 10 months ago
PageNUCA: Selected policies for page-grain locality management in large shared chip-multiprocessor caches
As the last-level on-chip caches in chip-multiprocessors increase in size, the physical locality of on-chip data becomes important for delivering high performance. The non-uniform...
Mainak Chaudhuri
KDD
2009
ACM
347views Data Mining» more  KDD 2009»
14 years 10 months ago
Network anomaly detection based on Eigen equation compression
This paper addresses the issue of unsupervised network anomaly detection. In recent years, networks have played more and more critical roles. Since their outages cause serious eco...
Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata,...