Sciweavers

176 search results - page 18 / 36
» On correlated availability in Internet-distributed systems
Sort
View
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 2 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
ICETE
2004
204views Business» more  ICETE 2004»
13 years 8 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
VISUALIZATION
2005
IEEE
14 years 1 months ago
Interactive Visual Analysis and Exploration of Injection Systems Simulations
Simulations often generate large amounts of data that require use of SciVis techniques for effective exploration of simulation results. In some cases, like 1D theory of fluid dyn...
Kresimir Matkovic, Mario Jelovic, Josip Juric, Zol...
USENIX
2004
13 years 8 months ago
Making the "Box" Transparent: System Call Performance as a First-Class Result
For operating system intensive applications, the ability of designers to understand system call performance behavior is essential to achieving high performance. Conventional perfo...
Yaoping Ruan, Vivek S. Pai
PAMI
2006
186views more  PAMI 2006»
13 years 7 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...