Sciweavers

23630 search results - page 4540 / 4726
» Common Information Model
Sort
View
154
Voted
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 11 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
INFOCOM
2009
IEEE
15 years 11 months ago
Considerations for Sizing Buffers in Optical Packet Switched Networks
— Optical packet switches of the foreseeable future are expected to have severely limited buffering capability, since storage of optical signals remains a difficult and expensiv...
Arun Vishwanath, Vijay Sivaraman, George N. Rouska...
148
Voted
ISMAR
2009
IEEE
15 years 11 months ago
Real-time in-situ visual feedback of task performance in mixed environments for learning joint psychomotor-cognitive tasks
This paper proposes an approach to mixed environment training of manual tasks requiring concurrent use of psychomotor and cognitive skills. To train concurrent use of both skill s...
Aaron Kotranza, D. Scott Lind, Carla M. Pugh, Benj...
135
Voted
CIKM
2009
Springer
15 years 11 months ago
Interactive, topic-based visual text summarization and analysis
We are building an interactive, visual text analysis tool that aids users in analyzing a large collection of text. Unlike existing work in text analysis, which focuses either on d...
Shixia Liu, Michelle X. Zhou, Shimei Pan, Weihong ...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
« Prev « First page 4540 / 4726 Last » Next »