Sciweavers

3741 search results - page 103 / 749
» Monitoring Database Objects
Sort
View
IJBRA
2008
116views more  IJBRA 2008»
13 years 8 months ago
High performance bio-image database retrieval using MPI
: Fast and accurate 3D object reconstruction and partial 3D component retrieval from 2D image slices represent a difficult and challenging problem. To group related objects on diff...
Yong Li, Xiujuan Chen, Saeid Belkasim, Yi Pan
SIGOPS
2008
146views more  SIGOPS 2008»
13 years 7 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
FMOODS
2003
13 years 9 months ago
Inductive Proof Outlines for Monitors in Java
The research concerning Java’s semantics and proof theory has mainly focussed on various aspects of sequential sub-languages. Java, however, integrates features of a class-based ...
Erika Ábrahám, Frank S. de Boer, Wil...
GECON
2008
Springer
121views Business» more  GECON 2008»
13 years 9 months ago
Monitoring and Reputation Mechanisms for Service Level Agreements
A Service Level Agreement (SLA) is an electronic contract between a service user and a provider, and specifies the service to be provided, Quality of Service (QoS) properties that...
Omer F. Rana, Martijn Warnier, Thomas B. Quillinan...
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 7 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...