Sciweavers

176 search results - page 34 / 36
» Automatic Amortised Worst-Case Execution Time Analysis
Sort
View
85
Voted
IPOM
2007
Springer
15 years 8 months ago
QoE Monitoring Platform for Video Delivery Networks
This paper presents a full video delivery network monitoring suite. Our monitoring tool offers a new view of a video delivery network, a view based on the quality perceived by fi...
Daniel De Vera, Pablo Rodríguez-Bocca, Gera...
138
Voted
IEEEAMS
2003
IEEE
15 years 7 months ago
JAGR: An Autonomous Self-Recovering Application Server
This paper demonstrates that the dependability of generic, evolving J2EE applications can be enhanced through a combination of a few recovery-oriented techniques. Our goal is to r...
George Candea, Emre Kiciman, Steve Zhang, Pedram K...
110
Voted
GECCO
2008
Springer
115views Optimization» more  GECCO 2008»
15 years 2 months ago
A genetic programming approach to business process mining
The aim of process mining is to identify and extract process patterns from data logs to reconstruct an overall process flowchart. As business processes become more and more comple...
Chris J. Turner, Ashutosh Tiwari, Jörn Mehnen
123
Voted
CSFW
2007
IEEE
15 years 8 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
PAMI
2008
183views more  PAMI 2008»
15 years 1 months ago
Shape-and-Behavior Encoded Tracking of Bee Dances
Behavior analysis of social insects has garnered impetus in recent years and has led to some advances in fields like control systems, flight navigation etc. Manual labeling of ins...
Ashok Veeraraghavan, Rama Chellappa, Mandyam Srini...