Sciweavers

1402 search results - page 129 / 281
» Design of an Automated System for Clustering Heterogeneous D...
Sort
View
109
Voted
ESSOS
2009
Springer
15 years 5 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
CCGRID
2010
IEEE
15 years 1 months ago
The Failure Trace Archive: Enabling Comparative Analysis of Failures in Diverse Distributed Systems
With the increasing functionality and complexity of distributed systems, resource failures are inevitable. While numerous models and algorithms for dealing with failures exist, th...
Derrick Kondo, Bahman Javadi, Alexandru Iosup, Dic...
101
Voted
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
15 years 6 months ago
A Scalable Collaborative Filtering Framework Based on Co-Clustering
Collaborative filtering-based recommender systems, which automatically predict preferred products of a user using known preferences of other users, have become extremely popular ...
Thomas George, Srujana Merugu
89
Voted
ICIP
2000
IEEE
16 years 2 months ago
Registration of Digital Ophthalmic Images Using Vector Mapping
This paper outlines a technique for the automated alignment of digital images of the retina under the assumption that they differ spatially by a geometric global transform. This a...
Neil Ryan, Conor Heneghan, M. Cahill
IAT
2007
IEEE
15 years 4 months ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...