Sciweavers

1906 search results - page 231 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
16 years 1 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal
SCM
2003
15 years 5 months ago
Integrating Software Construction and Software Deployment
Classically, software deployment is a process consisting of building the software, packaging it for distribution, and installing it at the target site. This approach has two proble...
Eelco Dolstra
ICMCS
2007
IEEE
133views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Foreground Segmentation in Surveillance Scenes Containing a Door
We propose a new method for performing accurate background subtraction in scenes with a door, like a building entrance or a hallway. This kind of scene is common in surveillance a...
Andrew Miller, Mubarak Shah
EUROPAR
2007
Springer
15 years 10 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong
IPPS
2009
IEEE
15 years 11 months ago
Improving MPI-HMMER's scalability with parallel I/O
We present PIO-HMMER, an enhanced version of MPI-HMMER. PIO-HMMER improves on MPIHMMER’s scalability through the use of parallel I/O and a parallel file system. In addition, we...
John Paul Walters, Rohan Darole, Vipin Chaudhary