Sciweavers

2468 search results - page 436 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
ISI
2008
Springer
15 years 3 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
ICSE
2009
IEEE-ACM
15 years 10 months ago
ITACA: An integrated toolbox for the automatic composition and adaptation of Web services
Adaptation is of utmost importance in systems developed by assembling reusable software services accessed through their public interfaces. This process aims at solving, as automat...
Javier Cámara, José Antonio Mart&iac...
CIMAGING
2009
265views Hardware» more  CIMAGING 2009»
15 years 4 months ago
Multi-object segmentation using coupled nonparametric shape and relative pose priors
We present a new method for multi-object segmentation in a maximum a posteriori estimation framework. Our method is motivated by the observation that neighboring or coupling objec...
Mustafa Gökhan Uzunbas, Octavian Soldea, M&uu...
ICDCS
2012
IEEE
13 years 5 months ago
Combining Partial Redundancy and Checkpointing for HPC
Today’s largest High Performance Computing (HPC) systems exceed one Petaflops (1015 floating point operations per second) and exascale systems are projected within seven years...
James Elliott, Kishor Kharbas, David Fiala, Frank ...
ICDM
2008
IEEE
184views Data Mining» more  ICDM 2008»
15 years 9 months ago
Bayesian Co-clustering
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze dyadic data connecting two entities. However, almost all existing co-clustering techniqu...
Hanhuai Shan, Arindam Banerjee