Sciweavers

2236 search results - page 128 / 448
» Intrusion detection techniques and approaches
Sort
View
OSDI
2004
ACM
15 years 10 months ago
Microreboot - A Technique for Cheap Recovery
A significant fraction of software failures in large-scale Internet systems are cured by rebooting, even when the exact failure causes are unknown. However, rebooting can be expen...
George Candea, Shinichi Kawamoto, Yuichi Fujiki, G...
HAPTICS
2002
IEEE
15 years 3 months ago
Computationally Efficient Techniques for Real Time Surgical Simulation with Force Feedback
In this paper, we present computationally efficient algorithms for the real time simulation of minimally invasive surgical (MIS) procedures. To develop a surgical simulator for tr...
Jung Kim, Suvranu De, Mandayam A. Srinivasan
SOCA
2008
IEEE
14 years 10 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart
71
Voted
MACOM
2010
14 years 8 months ago
Static Inter-Cell Interference Coordination Techniques for LTE Networks: A Fair Performance Assessment
Abstract. This paper focuses in the analysis of 100% static and distributed inter-cell interference coordination techniques in the context of LTE networks. Several methods have bee...
David González González, Mario Garc&...
TMI
1998
91views more  TMI 1998»
14 years 9 months ago
A Vision-Based Technique for Objective Assessment of Burn Scars
—In this paper a method for the objective assessment of burn scars is proposed. The quantitative measures developed in this research provide an objective way to calculate elastic...
Leonid V. Tsap, Dmitry B. Goldgof, Sudeep Sarkar, ...