Sciweavers

1291 search results - page 148 / 259
» Intrusion Detection for Distributed Applications
Sort
View
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
14 years 9 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
FAST
2004
13 years 10 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
EAGC
2003
Springer
14 years 2 months ago
Automatic Services Discovery, Monitoring and Visualization of Grid Environments: The MapCenter Approach
The complexity of Grid environments is growing as more projects and applications appear in this quick-evolving domain. Widespread applications are distributed over thousands of com...
Franck Bonnassieux, Robert Harakaly, Pascale Prime...
ICDAR
2009
IEEE
13 years 6 months ago
Extraction of Characters on Signboards in Natural Scene Images by Stump Classifiers
We present a method to detect characters on signboards in natural scene images. For many applications, both classifier with small computational cost and the efficient feature set,...
Minoru Maruyama, Takuma Yamaguchi
PPOPP
1997
ACM
14 years 12 days ago
Shared Memory Performance Profiling
This paper describes a new approach to finding performance bottlenecks in shared-memory parallel programs and its embodiment in the Paradyn Parallel Performance Tools running with...
Zhichen Xu, James R. Larus, Barton P. Miller