Sciweavers

347 search results - page 46 / 70
» Monitoring SCI Clusters
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 4 days ago
Searching and mining trillions of time series subsequences under dynamic time warping
Most time series data mining algorithms use similarity search as a core subroutine, and thus the time taken for similarity search is the bottleneck for virtually all time series d...
Thanawin Rakthanmanon, Bilson J. L. Campana, Abdul...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
15 years 10 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
70
Voted
ICRA
2009
IEEE
162views Robotics» more  ICRA 2009»
15 years 4 months ago
Distributed sensor analysis for fault detection in tightly-coupled multi-robot team tasks
— This paper presents a distributed version of our previous work, called SAFDetection, which is a sensor analysisbased fault detection approach that is used to monitor tightlycou...
Xingyan Li, Lynne E. Parker
79
Voted
ICDCS
2008
IEEE
15 years 4 months ago
Crystal: An Emulation Framework for Practical Peer-to-Peer Multimedia Streaming Systems
To rapidly evolve new designs of peer-to-peer (P2P) multimedia streaming systems, it is highly desirable to test and troubleshoot them in a controlled and repeatable experimental ...
Mea Wang, Hassan Shojania, Baochun Li
79
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin