Sciweavers

816 search results - page 155 / 164
» Performance Analysis Of A WWW Server
Sort
View
KBSE
2005
IEEE
15 years 7 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
119
Voted
RTSS
2005
IEEE
15 years 7 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar
155
Voted
MSR
2005
ACM
15 years 7 months ago
Software repository mining with Marmoset: an automated programming project snapshot and testing system
Most computer science educators hold strong opinions about the “right” approach to teaching introductory level programming. Unfortunately, we have comparatively little hard ev...
Jaime Spacco, Jaymie Strecker, David Hovemeyer, Wi...
108
Voted
KDD
2005
ACM
177views Data Mining» more  KDD 2005»
15 years 7 months ago
Combining partitions by probabilistic label aggregation
Data clustering represents an important tool in exploratory data analysis. The lack of objective criteria render model selection as well as the identification of robust solutions...
Tilman Lange, Joachim M. Buhmann
LOCA
2005
Springer
15 years 7 months ago
MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking
In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a mode...
Konrad Lorincz, Matt Welsh