Sciweavers

1291 search results - page 120 / 259
» Intrusion Detection for Distributed Applications
Sort
View
CORR
2008
Springer
149views Education» more  CORR 2008»
13 years 9 months ago
Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application
The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we...
Ori Shental, Danny Bickson, Paul H. Siegel, Jack K...
SRDS
2007
IEEE
14 years 3 months ago
An Analytical Framework and Its Applications for Studying Brick Storage Reliability
The reliability of a large-scale storage system is influenced by a complex set of inter-dependent factors. This paper presents a comprehensive and extensible analytical framework ...
Ming Chen, Wei Chen, Likun Liu, Zheng Zhang
SSIAI
2000
IEEE
14 years 1 months ago
Pairwise Markov Random Fields and its Application in Textured Images Segmentation
The use of random fields, which allows one to take into account the spatial interaction among random variables in complex systems, is a frequent tool in numerous problems of stati...
Wojciech Pieczynski, Abdel-Nasser Tebbache
PODC
2010
ACM
14 years 25 days ago
A modular approach to shared-memory consensus, with applications to the probabilistic-write model
We define two new classes of shared-memory objects: ratifiers, which detect agreement, and conciliators, which ensure agreement with some probability. We show that consensus can...
James Aspnes
PEPM
2009
ACM
14 years 1 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson