Sciweavers

1695 search results - page 333 / 339
» How smart are our environments
Sort
View
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 11 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
ICN
2007
Springer
15 years 10 months ago
Toward Broad-Spectrum Autonomic Management
— The fields of autonomics and system configuration share a common goal in decreasing the cost of ownership of large fabrics. In this paper we present a combined vision in whic...
Edmund Smith, Paul Anderson
ICSOC
2007
Springer
15 years 10 months ago
Pattern Based SOA Deployment
Abstract. A key function of a Service Oriented Architecture is the separation between business logic and the platform of its implementation and deployment. Much of the focus in SOA...
William Arnold, Tamar Eilam, Michael H. Kalantar, ...
OOPSLA
2007
Springer
15 years 10 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma
ICRA
2006
IEEE
119views Robotics» more  ICRA 2006»
15 years 10 months ago
Outdoor SLAM using Visual Appearance and Laser Ranging
— This paper describes a 3D SLAM system using information from an actuated laser scanner and camera installed on a mobile robot.The laser samples the local geometry of the enviro...
Paul M. Newman, David M. Cole, Kin Leong Ho