Sciweavers

3709 search results - page 212 / 742
» Supporting experimentation with Side-Views
Sort
View
CCS
2009
ACM
15 years 10 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
ESOP
2009
Springer
15 years 10 months ago
A Basis for Verifying Multi-threaded Programs
Abstract. Advanced multi-threaded programs apply concurrency concepts in sophisticated ways. For instance, they use fine-grained locking to increase parallelism and change locking...
K. Rustan M. Leino, Peter Müller
P2P
2009
IEEE
231views Communications» more  P2P 2009»
15 years 10 months ago
Measuring the Cost of Online Load-Balancing in Distributed Range-Queriable Systems
Distributed systems such as Peer-to-Peer overlays have been shown to efficiently support the processing of range queries over large numbers of participating hosts. In such system...
Ioannis Konstantinou, Dimitrios Tsoumakos, Nectari...
RTAS
2009
IEEE
15 years 10 months ago
QeDB: A Quality-Aware Embedded Real-Time Database
QeDB is a database for data-intensive real-time applications running on flash memory-based embedded systems. Currently, databases for embedded systems are best effort, providing ...
Woochul Kang, Sang Hyuk Son, John A. Stankovic
134
Voted
WEBI
2009
Springer
15 years 10 months ago
Effective Keyword Search for Software Resources Installed in Large-Scale Grid Infrastructures
—In this paper, we investigate the problem of supporting keyword-based searching for the discovery of software resources that are installed on the nodes of largescale, federated ...
George Pallis, Asterios Katsifodimos, Marios D. Di...