Sciweavers

1804 search results - page 291 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SIAMDM
2008
115views more  SIAMDM 2008»
13 years 8 months ago
Rank-Width and Well-Quasi-Ordering
Robertson and Seymour (1990) proved that graphs of bounded tree-width are well-quasi-ordered by the graph minor relation. By extending their arguments, Geelen, Gerards, and Whittle...
Sang-il Oum
MOC
1998
86views more  MOC 1998»
13 years 8 months ago
Vector subdivision schemes and multiple wavelets
We consider solutions of a system of refinement equations written in the form φ = α∈Z a(α)φ(2 · −α), where the vector of functions φ = (φ1, . . . , φr)T is in (Lp(R))...
Rong-Qing Jia, Sherman D. Riemenschneider, Ding-Xu...
VLDB
2002
ACM
156views Database» more  VLDB 2002»
13 years 8 months ago
A Logical Framework for Scheduling Workflows under Resource Allocation Constraints
A workflow consists of a collection of coordinated tasks designed to carry out a welldefined complex process, such as catalog ordering, trip planning, or a business process in an ...
Pinar Senkul, Michael Kifer, Ismail Hakki Toroslu
WDAG
2010
Springer
184views Algorithms» more  WDAG 2010»
13 years 7 months ago
Fast Asynchronous Consensus with Optimal Resilience
Abstract. We give randomized agreement algorithms with constant expected running time in asynchronous systems subject to process failures, where up to a minority of processes may f...
Ittai Abraham, Marcos Kawazoe Aguilera, Dahlia Mal...
ICIP
2002
IEEE
14 years 10 months ago
Fuzzy color signatures
With the large and increasing amount of visual information available in digital libraries and the Web, efficient and robust systems for image retrieval are urgently needed. In thi...
Andrés Dorado, Ebroul Izquierdo