Sciweavers

2236 search results - page 422 / 448
» Intrusion detection techniques and approaches
Sort
View
EUROSYS
2011
ACM
12 years 11 months ago
Finding complex concurrency bugs in large multi-threaded applications
Parallel software is increasingly necessary to take advantage of multi-core architectures, but it is also prone to concurrency bugs which are particularly hard to avoid, find, an...
Pedro Fonseca, Cheng Li, Rodrigo Rodrigues
NAR
2011
233views Computer Vision» more  NAR 2011»
12 years 10 months ago
TIARA: a database for accurate analysis of multiple personal genomes based on cross-technology
High-throughput genomic technologies have been used to explore personal human genomes for the past few years. Although the integration of technologies is important for high-accura...
Dongwan Hong, Sung-Soo Park, Young Seok Ju, Sheehy...
WWW
2010
ACM
14 years 2 months ago
DSNotify: handling broken links in the web of data
The Web of Data has emerged as a way of exposing structured linked data on the Web. It builds on the central building blocks of the Web (URIs, HTTP) and benefits from its simplic...
Niko Popitsch, Bernhard Haslhofer
PSIVT
2007
Springer
239views Multimedia» more  PSIVT 2007»
14 years 1 months ago
People Counting in Low Density Video Sequences
This paper presents a novel approach for automatic people counting in videos captured through a conventional closed-circuit television (CCTV) using computer vision techniques. The ...
Jaime Dalla Valle, Luiz E. Soares de Oliveira, Ale...
ECLIPSE
2006
ACM
14 years 1 months ago
Lighthouse: coordination through emerging design
Despite the fact that software development is an inherently collaborative activity, a great deal of software development is spent with developers in isolation, working on their ow...
Isabella A. da Silva, Ping Chen, Christopher van d...