Sciweavers

2436 search results - page 431 / 488
» Evaluating the impacts of network information models on appl...
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 8 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
CAIP
2009
Springer
221views Image Analysis» more  CAIP 2009»
14 years 2 months ago
Model Based Analysis of Face Images for Facial Feature Extraction
This paper describes a comprehensive approach to extract a common feature set from the image sequences. We use simple features which are easily extracted from a 3D wireframe model ...
Zahid Riaz, Christoph Mayer, Michael Beetz, Bernd ...
JCS
2008
88views more  JCS 2008»
13 years 7 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
CCGRID
2008
IEEE
13 years 7 months ago
Fault Tolerance and Recovery of Scientific Workflows on Computational Grids
In this paper, we describe the design and implementation of two mechanisms for fault-tolerance and recovery for complex scientific workflows on computational grids. We present our ...
Gopi Kandaswamy, Anirban Mandal, Daniel A. Reed
IS
2000
13 years 7 months ago
Concurrency control in mobile distributed real-time database systems
Abstract With the rapid advances in mobile computing technology, there is an increasing demand for processing realtime transactions in a mobile environment. This paper studies con...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...