Sciweavers

831 search results - page 132 / 167
» Finding Minimum Data Requirements Using Pseudo-independence
Sort
View
101
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Safe and effective fine-grained TCP retransmissions for datacenter communication
This paper presents a practical solution to a problem facing high-fan-in, high-bandwidth synchronized TCP workloads in datacenter Ethernets—the TCP incast problem. In these netw...
Vijay Vasudevan, Amar Phanishayee, Hiral Shah, Eli...
162
Voted
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 6 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
CVPR
2006
IEEE
16 years 5 months ago
When Fisher meets Fukunaga-Koontz: A New Look at Linear Discriminants
The Fisher Linear Discriminant (FLD) is commonly used in pattern recognition. It finds a linear subspace that maximally separates class patterns according to Fisher's Criteri...
Sheng Zhang, Terence Sim
116
Voted
CVPR
2008
IEEE
16 years 5 months ago
Who killed the directed model?
Prior distributions are useful for robust low-level vision, and undirected models (e.g. Markov Random Fields) have become a central tool for this purpose. Though sometimes these p...
Justin Domke, Alap Karapurkar, Yiannis Aloimonos
238
Voted
ICDE
2008
IEEE
204views Database» more  ICDE 2008»
16 years 4 months ago
Keyword Search on Spatial Databases
Many applications require finding objects closest to a specified location that contains a set of keywords. For example, online yellow pages allow users to specify an address and a ...
Ian De Felipe, Vagelis Hristidis, Naphtali Rishe