Sciweavers

1291 search results - page 249 / 259
» Intrusion Detection for Distributed Applications
Sort
View
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
14 years 9 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
HPCA
2008
IEEE
14 years 9 months ago
Supporting highly-decoupled thread-level redundancy for parallel programs
The continued scaling of device dimensions and the operating voltage reduces the critical charge and thus natural noise tolerance level of transistors. As a result, circuits can p...
M. Wasiur Rashid, Michael C. Huang
RECOMB
2004
Springer
14 years 9 months ago
Comparing in situ mRNA expression patterns of drosophila embryos
In situ staining of a target mRNA at several time points during the development of a D. melanogaster embryo gives one a detailed spatio-temporal view of the expression pattern of ...
Hanchuan Peng, Eugene W. Myers
OSDI
2008
ACM
14 years 9 months ago
On the Impact of Disk Scrubbing on Energy Savings
The increasing use of computers for saving valuable data imposes stringent reliability constraints on storage systems. Reliability improvement via use of redundancy is a common pr...
Guanying Wang, Ali Raza Butt, Chris Gniady
SIGMOD
2009
ACM
180views Database» more  SIGMOD 2009»
14 years 8 months ago
Indexing correlated probabilistic databases
With large amounts of correlated probabilistic data being generated in a wide range of application domains including sensor networks, information extraction, event detection etc.,...
Bhargav Kanagal, Amol Deshpande