Sciweavers

1791 search results - page 204 / 359
» Behavioral Operations
Sort
View
SRDS
2010
IEEE
15 years 1 months ago
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems
With the growing scale of current computing systems, traditional configuration tuning methods become less effective because they usually assume a small number of parameters in the...
Haifeng Chen, Guofei Jiang, Hui Zhang 0002, Kenji ...
137
Voted
USS
2010
15 years 1 months ago
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
Reverse Turing tests, or CAPTCHAs, have become an ubiquitous defense used to protect open Web resources from being exploited at scale. An effective CAPTCHA resists existing mechan...
Marti Motoyama, Kirill Levchenko, Chris Kanich, Da...
160
Voted
PAMI
2011
14 years 10 months ago
Multiperson Visual Focus of Attention from Head Pose and Meeting Contextual Cues
—This paper introduces a novel contextual model for the recognition of people’s visual focus of attention (VFOA) in meetings from audio-visual perceptual cues. More specificall...
Sileye O. Ba, Jean-Marc Odobez
147
Voted
DSN
2011
IEEE
14 years 3 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
176
Voted
SIGMETRICS
2012
ACM
271views Hardware» more  SIGMETRICS 2012»
13 years 6 months ago
An empirical comparison of Java remote communication primitives for intra-node data transmission
This paper presents a benchmarking suite that measures the performance of using sockets and eXtensible Markup Language remote procedure calls (XML-RPC) to exchange intra-node mess...
Philip F. Burdette, William F. Jones, Brian C. Blo...