Sciweavers

266 search results - page 45 / 54
» Exception handling patterns for processes
Sort
View
AIPR
2007
IEEE
14 years 1 months ago
Moving Vehicle Registration and Super-Resolution
We describe a method for registering and superresolving moving vehicles from aerial surveillance video. The challenge of vehicle super-resolution lies in the fact that vehicles ma...
Frederick W. Wheeler, Anthony J. Hoogs
INFOCOM
2006
IEEE
14 years 1 months ago
Request-Aware Scheduling for Busy Internet Services
— Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies scheduling algorithms for in...
Jingyu Zhou, Caijie Zhang, Tao Yang, Lingkun Chu
ICICS
2005
Springer
14 years 1 months ago
PCAV: Internet Attack Visualization on Parallel Coordinates
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
Hyunsang Choi, Heejo Lee
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
14 years 1 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
DOLAP
2004
ACM
14 years 28 days ago
A new OLAP aggregation based on the AHC technique
Nowadays, decision support systems are evolving in order to handle complex data. Some recent works have shown the interest of combining on-line analysis processing (OLAP) and data...
Riadh Ben Messaoud, Omar Boussaid, Sabine Rabas&ea...