Sciweavers

211 search results - page 35 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
ECOOP
2000
Springer
13 years 12 months ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews
IAT
2006
IEEE
14 years 1 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
SRDS
2010
IEEE
13 years 5 months ago
Invariants Based Failure Diagnosis in Distributed Computing Systems
This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our meth...
Haifeng Chen, Guofei Jiang, Kenji Yoshihira, Akhil...
ICASSP
2011
IEEE
12 years 11 months ago
Color correction for object tracking across multiple cameras
Color is a powerful attribute that is used to characterize objects for tracking and other surveillance tasks. Since color is dependent on ambient illumination and the imaging equi...
Satyam Srivastava, Ka Ki Ng, Edward J. Delp
INFOCOM
2005
IEEE
14 years 1 months ago
BARD: Bayesian-assisted resource discovery in sensor networks
Data dissemination in sensor networks requires four components: resource discovery, route establishment, packet forwarding, and route maintenance. Resource discovery can be the mos...
Fred Stann, John S. Heidemann