Sciweavers

2799 search results - page 438 / 560
» computing 1998
Sort
View
ICNP
1998
IEEE
15 years 6 months ago
Statistical Anomaly Detection for Link-State Routing Protocols
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the imple...
D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyht...
IPPS
1998
IEEE
15 years 6 months ago
Design and Implementation of a Parallel I/O Runtime System for Irregular Applications
In this paper we present the design, implementation and evaluation of a runtime system based on collective I/O techniques for irregular applications. We present two models, namely...
Jaechun No, Sung-Soon Park, Jesús Carretero...
CSCW
1998
ACM
15 years 6 months ago
Evaluating Emergent Collaboration on the Web
Links between web sites can be seen as evidence of a type of emergent collaboration among web site authors. We report here on an empirical investigation into emergent collaboratio...
Loren G. Terveen, William C. Hill
ICIP
1998
IEEE
16 years 4 months ago
Generalized Distance based Matching of Nonbinary Images
We develope a technique to perform e cient and accurate matching to detect the occurences of a template in a scene. The template may describe an object or a textured surface. Repr...
Bülent Sankur, Cenk Köse, Valery V. Star...
ICECCS
1998
IEEE
123views Hardware» more  ICECCS 1998»
15 years 6 months ago
Applying Slicing Technique to Software Architectures
Software architecture is receiving increasingly attention as a critical design level for software systems. As software architecture design resources (in the form of architectural ...
Jianjun Zhao