Sciweavers

129 search results - page 25 / 26
» User- and job-centric monitoring: Analysing and presenting l...
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 8 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
RTSS
2008
IEEE
14 years 2 months ago
A Holistic Approach to Decentralized Structural Damage Localization Using Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpen...
Gregory Hackmann, Fei Sun, Nestor Castaneda, Cheny...
SIGMETRICS
2010
ACM
143views Hardware» more  SIGMETRICS 2010»
14 years 14 days ago
Practical performance models for complex, popular applications
Perhaps surprisingly, no practical performance models exist for popular (and complex) client applications such as Adobe’s Creative Suite, Microsoft’s Office and Visual Studio...
Eno Thereska, Bjoern Doebel, Alice X. Zheng, Peter...
CHI
2011
ACM
12 years 11 months ago
Real-time nonverbal opinion sharing through mobile phones during sports events
Even with the rise of the World Wide Web, TV has remained the most pervasive entertainment medium and is nowadays often used together with other media, which allow for active part...
Alireza Sahami Shirazi, Michael Rohs, Robert Schle...
IMC
2006
ACM
14 years 1 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...