Sciweavers

989 search results - page 157 / 198
» Intelligent Remote Monitoring
Sort
View
ECAI
2010
Springer
15 years 2 months ago
Optimal Task Migration in Service-Oriented Systems: Algorithms and Mechanisms
In service-oriented systems, such as grids and clouds, users are able to outsource complex computational tasks by procuring resources on demand from remote service providers. As th...
Sebastian Stein, Enrico Gerding, Nicholas R. Jenni...
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
16 years 2 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider
HPCA
2005
IEEE
16 years 2 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
APSCC
2009
IEEE
15 years 8 months ago
MORSE: A Model-Aware Service Environment
—In a number of scenarios, services generated using a model-driven development (MDD) approach could benefit from “reflective” access to the information in the models from w...
Ta'id Holmes, Uwe Zdun, Schahram Dustdar
AIME
2009
Springer
15 years 8 months ago
Providing Objective Feedback on Skill Assessment in a Dental Surgical Training Simulator
Dental students devote several years to the acquisition of sufficient psychomotor skills to prepare them for entry-level dental practice. Traditional methods of dental surgical ski...
Phattanapon Rhienmora, Peter Haddawy, Siriwan Sueb...