Sciweavers

1906 search results - page 193 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
109
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
145
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 4 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
ECRTS
2008
IEEE
15 years 10 months ago
Temporal Analysis for Adapting Concurrent Applications to Embedded Systems
Embedded services and applications that interact with the real world often, over time, need to run on different kinds of hardware (low-cost microcontrollers to powerful multicore ...
Sibin Mohan, Johannes Helander
MM
2006
ACM
197views Multimedia» more  MM 2006»
15 years 10 months ago
Virtual observers in a mobile surveillance system
Conventional wide-area video surveillance systems use a network of fixed cameras positioned close to locations of interest. We describe an alternative and flexible approach to w...
Stewart Greenhill, Svetha Venkatesh
ICIP
2007
IEEE
15 years 10 months ago
Propagating Image-Level Part Statistics to Enhance Object Detection
The bag-of-words approach has become increasingly attractive in the fields of object category recognition and scene classification, witnessed by some successful applications [5, 7...
Sheng Gao, Joo-Hwee Lim, Qibin Sun