Sciweavers

1291 search results - page 172 / 259
» Intrusion Detection for Distributed Applications
Sort
View
PPOPP
2009
ACM
14 years 9 months ago
Detecting and tolerating asymmetric races
Because data races represent a hard-to-manage class of errors in concurrent programs, numerous approaches to detect them have been proposed and evaluated. We specifically consider...
Paruj Ratanaworabhan, Martin Burtscher, Darko Kiro...
SIGCOMM
2010
ACM
13 years 9 months ago
Detecting the performance impact of upgrades in large operational networks
Networks continue to change to support new applications, improve reliability and performance and reduce the operational cost. The changes are made to the network in the form of up...
Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman S...
ATAL
2005
Springer
14 years 2 months ago
Agent-based recognition of facial expressions
Description of a system to detect facial expressions using an agent-based approach is presented. The system utilizes interaction between Matlab-based image filters and a JADEbased...
Pablo Suau Pérez, Maria Del Mar Pujol L&oac...
CVPR
2004
IEEE
14 years 10 months ago
Detection and Removal of Rain from Videos
The visual effects of rain are complex. Rain consists of spatially distributed drops falling at high velocities. Each drop refracts and reflects the environment, producing sharp i...
Kshitiz Garg, Shree K. Nayar
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 9 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...