Sciweavers

12052 search results - page 2288 / 2411
» computer 2010
Sort
View
IMC
2010
ACM
13 years 8 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
IMC
2010
ACM
13 years 8 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
ISW
2010
Springer
13 years 8 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
MICCAI
2010
Springer
13 years 8 months ago
Biomarkers for Identifying First-Episode Schizophrenia Patients Using Diffusion Weighted Imaging
Recent advances in diffusion weighted MR imaging (dMRI) has made it a tool of choice for investigating white matter abnormalities of the brain and central nervous system. In this w...
Yogesh Rathi, James G. Malcolm, Oleg V. Michailovi...
MM
2010
ACM
158views Multimedia» more  MM 2010»
13 years 8 months ago
Image segmentation with patch-pair density priors
In this paper, we investigate how an unlabeled image corpus can facilitate the segmentation of any given image. A simple yet efficient multi-task joint sparse representation model...
Xiaobai Liu, Jiashi Feng, Shuicheng Yan, Hai Jin
« Prev « First page 2288 / 2411 Last » Next »