Sciweavers

1869 search results - page 315 / 374
» Analysis of Network Processing Workloads
Sort
View
P2P
2009
IEEE
167views Communications» more  P2P 2009»
15 years 10 months ago
ID Repetition in Kad
ID uniqueness is essential in DHT-based systems as peer lookup and resource searching rely on IDmatching. Many previous works and measurements on Kad do not take into account that...
Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zh...
RAID
2009
Springer
15 years 9 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
ICMCS
2008
IEEE
120views Multimedia» more  ICMCS 2008»
15 years 9 months ago
Using Semantic Graphs for Image Search
In this paper, we propose a Semantic Graphs for Image Search (SGIS) system, which provides a novel way for image search by utilizing collaborative knowledge in Wikipedia and netwo...
Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching...
118
Voted
ICOST
2007
Springer
15 years 9 months ago
Distributed Vision-Based Accident Management for Assisted Living
We consider the problem of assisting vulnerable people and their carers to reduce the occurrence, and concomitant consequences, of accidents in the home. A wireless sensor network ...
Hamid K. Aghajan, Juan Carlos Augusto, Chen Wu, Pa...
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 9 months ago
ACLE: A Communication Environment for Asynchronous Collaborative Learning
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (...
Timothy J. Ellis, William Hafner