Sciweavers

13489 search results - page 2685 / 2698
» Operating System
Sort
View
107
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
118
Voted
JFP
2010
107views more  JFP 2010»
15 years 29 days ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
141
Voted
JIRS
2010
153views more  JIRS 2010»
15 years 29 days ago
Active Visual Perception for Mobile Robot Localization
Abstract Localization is a key issue for a mobile robot, in particular in environments where a globally accurate positioning system, such as GPS, is not available. In these environ...
Javier Correa, Alvaro Soto
127
Voted
JSAC
2010
138views more  JSAC 2010»
15 years 29 days ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar
KBSE
2010
IEEE
15 years 29 days ago
MODA: automated test generation for database applications via mock objects
Software testing has been commonly used in assuring the quality of database applications. It is often prohibitively expensive to manually write quality tests for complex database ...
Kunal Taneja, Yi Zhang, Tao Xie
« Prev « First page 2685 / 2698 Last » Next »