Sciweavers

587 search results - page 86 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
134
Voted
PLDI
2011
ACM
14 years 3 months ago
Isolating and understanding concurrency errors using reconstructed execution fragments
In this paper we propose Recon, a new general approach to concurrency debugging. Recon goes beyond just detecting bugs, it also presents to the programmer short fragments of buggy...
Brandon Lucia, Benjamin P. Wood, Luis Ceze
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
13 years 8 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
100
Voted
CIKM
2009
Springer
15 years 7 months ago
Joint sentiment/topic model for sentiment analysis
Sentiment analysis or opinion mining aims to use automated tools to detect subjective information such as opinions, attitudes, and feelings expressed in text. This paper proposes ...
Chenghua Lin, Yulan He
103
Voted
PDP
2002
IEEE
15 years 5 months ago
Eventually Consistent Failure Detectors
The concept of unreliable failure detector was introduced by Chandra and Toueg as a mechanism that provides information about process failures. This mechanism has been used to sol...
Mikel Larrea, Antonio Fernández, Sergio Ar&...
108
Voted
ICIP
2002
IEEE
16 years 2 months ago
Fuzzy color signatures
With the large and increasing amount of visual information available in digital libraries and the Web, efficient and robust systems for image retrieval are urgently needed. In thi...
Andrés Dorado, Ebroul Izquierdo