Sciweavers

364 search results - page 43 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
MM
2010
ACM
252views Multimedia» more  MM 2010»
14 years 10 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
SIGMOD
2008
ACM
297views Database» more  SIGMOD 2008»
16 years 9 months ago
Automatic Virtual Machine Configuration for Database Workloads
Virtual machine monitors are becoming popular tools for the deployment of database management systems and other enterprise software applications. In this paper, we consider a commo...
Ahmed A. Soror, Ashraf Aboulnaga, Kenneth Salem, P...
SIGCSE
2004
ACM
125views Education» more  SIGCSE 2004»
15 years 3 months ago
Agent-based cooperative learning: a proof-of-concept experiment
This paper presents an innovative multiagent system to support cooperative learning among students both in the real classrooms and in distance education. The system, called I-MIND...
Leen-Kiat Soh, Hong Jiang, Charles Ansorge
EUROSYS
2009
ACM
15 years 6 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
65
Voted
SIGCOMM
2010
ACM
14 years 10 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...