Sciweavers

288 search results - page 35 / 58
» Performance anomaly of 802.11b
Sort
View
CORR
2010
Springer
106views Education» more  CORR 2010»
14 years 9 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
RV
2010
Springer
133views Hardware» more  RV 2010»
14 years 8 months ago
Compensation-Aware Runtime Monitoring
To avoid large overheads induced by runtime monitoring, the use of asynchronous log-based monitoring is sometimes adopted — even though this implies that the system may proceed f...
Christian Colombo, Gordon J. Pace, Patrick Abela
ICAC
2009
IEEE
15 years 4 months ago
AdaptGuard: guarding adaptive systems from instability
In this paper, we design, implement and evaluate AdaptGuard, a software service for guarding adaptive systems, such as QoS-adaptive servers, from instability caused by software an...
Jin Heo, Tarek F. Abdelzaher
IEEEPACT
2009
IEEE
15 years 4 months ago
Chainsaw: Using Binary Matching for Relative Instruction Mix Comparison
With advances in hardware, instruction set architectures are undergoing continual evolution. As a result, compilers are under constant pressure to adapt and take full advantage of...
Tipp Moseley, Dirk Grunwald, Ramesh Peri
KDD
2001
ACM
1203views Data Mining» more  KDD 2001»
15 years 10 months ago
Application of Data Mining Techniques for Medical Image Classification
Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents some experiments for tumou...
Maria-Luiza Antonie, Osmar R. Zaïane, Alexand...