Sciweavers

173 search results - page 33 / 35
» Dynamic information source selection for intrusion detection...
Sort
View
OOPSLA
2004
Springer
15 years 3 months ago
Method-level phase behavior in java workloads
Java workloads are becoming more and more prominent on various computing devices. Understanding the behavior of a Java workload which includes the interaction between the applicat...
Andy Georges, Dries Buytaert, Lieven Eeckhout, Koe...
SIGIR
2012
ACM
13 years 2 days ago
TwiNER: named entity recognition in targeted twitter stream
Many private and/or public organizations have been reported to create and monitor targeted Twitter streams to collect and understand users’ opinions about the organizations. Tar...
Chenliang Li, Jianshu Weng, Qi He, Yuxia Yao, Anwi...
CACM
2008
131views more  CACM 2008»
14 years 9 months ago
Exterminator: Automatically correcting memory errors with high probability
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangling pointers. These errors, which can lead to crashes, erroneous execution, and...
Gene Novark, Emery D. Berger, Benjamin G. Zorn
79
Voted
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Polyphonic Audio Key Finding Using the Spiral Array CEG Algorithm
Key finding is an integral step in content-based music indexing and retrieval. In this paper, we present an O(n) real-time algorithm for determining key from polyphonic audio. We ...
Ching-Hua Chuan, Elaine Chew
TNN
2008
124views more  TNN 2008»
14 years 9 months ago
Just-in-Time Adaptive Classifiers - Part II: Designing the Classifier
Aging effects, environmental changes, thermal drifts, and soft and hard faults affect physical systems by changing their nature and behavior over time. To cope with a process evolu...
Cesare Alippi, Manuel Roveri