Sciweavers

322 search results - page 16 / 65
» Recovering execution data from incomplete observations
Sort
View
ICCV
2007
IEEE
14 years 4 months ago
Toward a Theory of Shape from Specular Flow
The image of a curved, specular (mirror-like) surface is a distorted reflection of the environment. The goal of our work is to develop a framework for recovering general shape fr...
Yair Adato, Yuriy Vasilyev, Ohad Ben-Shahar, Todd ...
ICWS
2008
IEEE
13 years 11 months ago
A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows
Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This ...
Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang T...
WMCSA
1999
IEEE
14 years 2 months ago
Broadcast of Consistent Data to Read-Only Transactions from Mobile Clients
In this paper, we study the inconsistency problem in data broadcast. While data items in a mobile computing system are being broadcast, update transactions may install new values ...
Kam-yiu Lam, Mei-Wau Au, Edward Chan
ACSAC
2008
IEEE
14 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
JMLR
2012
12 years 8 days ago
High-Rank Matrix Completion
This paper considers the problem of completing a matrix with many missing entries under the assumption that the columns of the matrix belong to a union of multiple low-rank subspa...
Brian Eriksson, Laura Balzano, Robert Nowak