Sciweavers

148 search results - page 15 / 30
» Exploiting Semantics for Event Detection Systems
Sort
View
ACMACE
2005
ACM
14 years 1 months ago
Fast delivery of game events with an optimistic synchronization mechanism in massive multiplayer online games
As smart players often win MMOG sessions by adopting frantic gaming strategies along the game evolution, also the system activities concerned with the distributed support of MMOGs...
Stefano Ferretti, Marco Roccetti
VL
2009
IEEE
157views Visual Languages» more  VL 2009»
14 years 2 months ago
Combining spatial and semantic label analysis
Labels in spreadsheets can be exploited for finding errors in spreadsheet formulas. Previous approaches have either used the positional information of labels or their interpretat...
Chris Chambers, Martin Erwig
RAID
2010
Springer
13 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
IPPS
2007
IEEE
14 years 1 months ago
An Adaptive Semantic Filter for Blue Gene/L Failure Log Analysis
— Frequent failure occurrences are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in ...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
ICDCS
2007
IEEE
14 years 1 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu