Sciweavers

194 search results - page 31 / 39
» I-RMI: Performance Isolation in Information Flow Application...
Sort
View
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 2 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
SISW
2005
IEEE
14 years 1 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
SIGIR
2006
ACM
14 years 1 months ago
Identifying comparative sentences in text documents
This paper studies the problem of identifying comparative sentences in text documents. The problem is related to but quite different from sentiment/opinion sentence identification...
Nitin Jindal, Bing Liu
MICCAI
2002
Springer
14 years 8 months ago
Recognizing Deviations from Normalcy for Brain Tumor Segmentation
A framework is proposed for the segmentation of brain tumors from MRI. Instead of training on pathology, the proposed method trains exclusively on healthy tissue. The algorithm att...
David T. Gering, W. Eric L. Grimson, Ron Kikinis
GLOBECOM
2008
IEEE
14 years 2 months ago
Physical Layer Network Coding Schemes over Finite and Infinite Fields
: Direct application of network coding at the physical layer - physical layer network coding (PNC) - is a promising technique for two-way relay wireless networks. In a two-way rela...
Shengli Zhang, Soung Chang Liew, Lu Lu