This paper characterizes the workload seen at the storage subsystem of an e-commerce system. Measurements are conducted on multi-tiered systems running three different benchmarks,...
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
This paper solves the open problem of extracting the maximal number of iterations from a loop that can be executed in parallel on chip multiprocessors. Our algorithm solves it opt...
Duo Liu, Zili Shao, Meng Wang, Minyi Guo, Jingling...
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
The performance of computer vision systems for measurement, surveillance, reconstruction, gait recognition, and many other applications, depends heavily on the placement of camera...
Robert Bodor, Paul R. Schrater, Nikolaos Papanikol...