Sciweavers

452 search results - page 54 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
SC
2000
ACM
15 years 2 months ago
Dynamic Software Testing of MPI Applications with Umpire
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for managing coarse-grained concurrency on distributed com...
Jeffrey S. Vetter, Bronis R. de Supinski
FGCN
2008
IEEE
200views Communications» more  FGCN 2008»
15 years 4 months ago
Fast Method for Multiple Human Face Segmentation in Color Image
Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
78
Voted
EUROSYS
2008
ACM
15 years 6 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
MUM
2005
ACM
92views Multimedia» more  MUM 2005»
15 years 3 months ago
User experiences with mobile phone camera game interfaces
This paper presents the findings of a comparative study investigating different input interfaces for a mobile phone games application. A standard mobile phone joystick interface i...
Sam Bucolo, Mark Billinghurst, David Sickinger
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
15 years 10 months ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill