Sciweavers

831 search results - page 132 / 167
» Finding Minimum Data Requirements Using Pseudo-independence
Sort
View
SIGCOMM
2009
ACM
14 years 4 months ago
Safe and effective fine-grained TCP retransmissions for datacenter communication
This paper presents a practical solution to a problem facing high-fan-in, high-bandwidth synchronized TCP workloads in datacenter Ethernets—the TCP incast problem. In these netw...
Vijay Vasudevan, Amar Phanishayee, Hiral Shah, Eli...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
14 years 1 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
CVPR
2006
IEEE
15 years 3 days ago
When Fisher meets Fukunaga-Koontz: A New Look at Linear Discriminants
The Fisher Linear Discriminant (FLD) is commonly used in pattern recognition. It finds a linear subspace that maximally separates class patterns according to Fisher's Criteri...
Sheng Zhang, Terence Sim
CVPR
2008
IEEE
15 years 3 days ago
Who killed the directed model?
Prior distributions are useful for robust low-level vision, and undirected models (e.g. Markov Random Fields) have become a central tool for this purpose. Though sometimes these p...
Justin Domke, Alap Karapurkar, Yiannis Aloimonos
ICDE
2008
IEEE
204views Database» more  ICDE 2008»
14 years 11 months ago
Keyword Search on Spatial Databases
Many applications require finding objects closest to a specified location that contains a set of keywords. For example, online yellow pages allow users to specify an address and a ...
Ian De Felipe, Vagelis Hristidis, Naphtali Rishe