Sciweavers

20833 search results - page 4084 / 4167
» Hidden process models
Sort
View
PLDI
2003
ACM
15 years 8 months ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program’s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...
SIGCOMM
2003
ACM
15 years 8 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
SIGGRAPH
2003
ACM
15 years 8 months ago
Perceptual evaluation of tone mapping operators
A number of successful tone mapping operators for contrast compression have been proposed due to the need to visualize high dynamic range (HDR) images on low dynamic range devices...
Frédéric Drago, William L. Martens, ...
134
Voted
CIKM
2003
Springer
15 years 8 months ago
Automated index management for distributed web search
Distributed heterogeneous search systems are an emerging phenomenon in Web search, in which independent topic-specific search engines provide search services, and metasearchers d...
Rinat Khoussainov, Nicholas Kushmerick
EAGC
2003
Springer
15 years 8 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
« Prev « First page 4084 / 4167 Last » Next »