Sciweavers

255 search results - page 40 / 51
» Timing Anomalies Reloaded
Sort
View
ICDM
2006
IEEE
135views Data Mining» more  ICDM 2006»
14 years 4 months ago
SAXually Explicit Images: Finding Unusual Shapes
Among the visual features of multimedia content, shape is of particular interest because humans can often recognize objects solely on the basis of shape. Over the past three decad...
Li Wei, Eamonn J. Keogh, Xiaopeng Xi
IJCNN
2006
IEEE
14 years 4 months ago
Using Neural Network to Enhance Assimilating Sea Surface Height Data into an Ocean Model
—A generic approach that allows extracting functional nonlinear dependencies and mappings between atmospheric or ocean state variables in a relatively simple form is presented. T...
Vladimir M. Krasnopolsky, Carlos J. Lozano, Deanna...
DMSN
2006
ACM
14 years 4 months ago
Intelligent system monitoring on large clusters
Modern data centers have a large number of components that must be monitored, including servers, switches/routers, and environmental control systems. This paper describes InteMon,...
Jimeng Sun, Evan Hoke, John D. Strunk, Gregory R. ...
CLUSTER
2005
IEEE
14 years 3 months ago
TCP Adaptation for MPI on Long-and-Fat Networks
Typical MPI applications work in phases of computation and communication, and messages are exchanged in relatively small chunks. This behavior is not optimal for TCP because TCP i...
Motohiko Matsuda, Tomohiro Kudoh, Yuetsu Kodama, R...
ISSADS
2005
Springer
14 years 3 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...