Sciweavers

196 search results - page 5 / 40
» On Isolating Points Using Disks
Sort
View
ICDM
2008
IEEE
146views Data Mining» more  ICDM 2008»
14 years 2 months ago
Isolation Forest
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify instances that do not conform to the normal profile as anomalies...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
OOPSLA
2007
Springer
14 years 1 months ago
Transactions with isolation and cooperation
We present the TIC (Transactions with Isolation and Cooperation) model for concurrent programming. TIC adds to standard transactional memory the ability for a transaction to obser...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
ESA
2004
Springer
160views Algorithms» more  ESA 2004»
14 years 1 months ago
Optimal External Memory Planar Point Enclosure
Abstract. In this paper we study the external memory planar point enclosure problem: Given N axis-parallel rectangles in the plane, construct a data structure on disk (an index) su...
Lars Arge, Vasilis Samoladas, Ke Yi
MIDDLEWARE
2005
Springer
14 years 1 months ago
I-RMI: Performance Isolation in Information Flow Applications
A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performa...
Mohamed S. Mansour, Karsten Schwan
INFOCOM
2009
IEEE
14 years 2 months ago
Isolating Physical PER for Smart Rate Selection in 802.11
—Current rate control (selection) algorithms in IEEE 802.11 are not based on accurate measurements of packet errors caused at the physical layer. Instead, algorithms act on measu...
Malik Ahmad Yar Khan, Darryl Veitch