Sciweavers

2236 search results - page 359 / 448
» Intrusion detection techniques and approaches
Sort
View
DSN
2008
IEEE
14 years 3 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
14 years 3 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
ICIP
2007
IEEE
14 years 3 months ago
Local Feature Extraction for Image Super-Resolution
The problem of image super-resolution from a set of low resolution multiview images has recently received much attention and can be decomposed, at least conceptually, into two con...
Loïc Baboulaz, Pier Luigi Dragotti
NCA
2007
IEEE
14 years 3 months ago
Using Virtualization to Improve Software Rejuvenation
In this paper, we present an approach for software rejuvenation based on automated self-healing techniques that can be easily applied to off-the-shelf Application Servers and Inte...
Luís Moura Silva, Javier Alonso, Paulo Silv...
COSIT
2007
Springer
136views GIS» more  COSIT 2007»
14 years 3 months ago
Spatial Semantics in Difference Spaces
Higher level semantics are considered useful in the geospatial domain, yet there is no general consensus on the form these semantics should take. Indeed, knowledge representation p...
Vlad Tanasescu