Sciweavers

282 search results - page 37 / 57
» Improved Thumbprint and Its Application for Intrusion Detect...
Sort
View
DEBS
2010
ACM
15 years 3 months ago
Reliable complex event detection for pervasive computing
Complex event processing for pervasive computing must deal with various sources of error. In this paper, we focus on improving complex event detector handling of several types of ...
Dan O'Keeffe, Jean Bacon
NSDI
2004
15 years 15 days ago
SWAP: A Scheduler with Automatic Process Dependency Detection
We have developed SWAP, a system that automatically detects process dependencies and accounts for such dependencies in scheduling. SWAP uses system call history to determine possi...
Haoqiang Zheng, Jason Nieh
KES
2010
Springer
14 years 9 months ago
DOCODE-Lite: A Meta-Search Engine for Document Similarity Retrieval
The retrieval of similar documents from large scale datasets has been the one of the main concerns in knowledge management environments, such as plagiarism detection, news impact a...
Felipe Bravo-Marquez, Gaston L'Huillier, Sebasti&a...
SIGIR
2006
ACM
15 years 5 months ago
Thread detection in dynamic text message streams
Text message stream is a newly emerging type of Web data which is produced in enormous quantities with the popularity of Instant Messaging and Internet Relay Chat. It is benefici...
Dou Shen, Qiang Yang, Jian-Tao Sun, Zheng Chen
ARC
2010
Springer
144views Hardware» more  ARC 2010»
15 years 6 months ago
QUAD - A Memory Access Pattern Analyser
In this paper, we present the Quantitative Usage Analysis of Data (QUAD) tool, a sophisticated memory access tracing tool that provides a comprehensive quantitative analysis of mem...
S. Arash Ostadzadeh, Roel Meeuws, Carlo Galuzzi, K...