Sciweavers

2250 search results - page 20 / 450
» Authorizing applications in singularity
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 5 days ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
HPDC
2007
IEEE
15 years 6 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov
SIBGRAPI
2005
IEEE
15 years 5 months ago
A Maximum Uncertainty LDA-Based Approach for Limited Sample Size Problems : With Application to Face Recognition
A critical issue of applying Linear Discriminant Analysis (LDA) is both the singularity and instability of the within-class scatter matrix. In practice, particularly in image recog...
Carlos E. Thomaz, Duncan Fyfe Gillies
SDM
2011
SIAM
414views Data Mining» more  SDM 2011»
14 years 2 months ago
Clustered low rank approximation of graphs in information science applications
In this paper we present a fast and accurate procedure called clustered low rank matrix approximation for massive graphs. The procedure involves a fast clustering of the graph and...
Berkant Savas, Inderjit S. Dhillon
BMVC
2010
14 years 9 months ago
Calibration of Non-Overlapping Cameras---Application to Vision-Based Robotics
Multi-camera systems are more and more used in vision-based robotics. An accurate extrinsic calibration is usually required. In most of cases, this task is done by matching featur...
Pierre Lébraly, Eric Royer, Omar Ait-Aider,...