Sciweavers

253 search results - page 42 / 51
» How to Transform an Analyzer into a Verifier
Sort
View
ICML
2010
IEEE
13 years 8 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
JOC
2008
92views more  JOC 2008»
13 years 7 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
TCSV
2008
94views more  TCSV 2008»
13 years 7 months ago
FGS Coding Using Cycle-Based Leaky Prediction Through Multiple Leaky Factors
This paper proposes a fine granularity scalable (FGS) coding using cycle-based leaky prediction, in which the multiple leaky factors are used to yield enhancement layer prediction ...
Xiangyang Ji, Yanyan Zheng, Debin Zhao, Feng Wu, W...
DEXA
2010
Springer
138views Database» more  DEXA 2010»
13 years 5 months ago
Enrichment of Raw Sensor Data to Enable High-Level Queries
Abstract. Sensor networks are increasingly used across various application domains. Their usage has the advantage of automated, often continuous, monitoring of activities and event...
Kenneth Conroy, Mark Roantree
IKE
2010
13 years 5 months ago
Active Datawarehouse Loading by Tool Based ETL Procedure
: Over the years, DataWarehousing has gone through a number of evolutions from a relatively simple reporting database to sophisticated analytical applications such as analyzing cus...
Mallikharjuna Reddy V, Sanjay K. Jena