Sciweavers

3819 search results - page 631 / 764
» Predicting Dependability by Testing
Sort
View
DSN
2000
IEEE
15 years 8 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
ICPR
2000
IEEE
15 years 8 months ago
3-D Object Reconstruction Using Spatially Extended Voxels and Multi-Hypothesis Voxel Coloring
In this paper we describe a voxel-based 3-D reconstruction technique from multiple calibrated camera views that makes explicit use of the finite size footprint of a voxel when pr...
Eckehard G. Steinbach, Bernd Girod, Peter Eisert, ...
MSS
2000
IEEE
106views Hardware» more  MSS 2000»
15 years 8 months ago
Disk Subsystem Performance Evaluation: From Disk Drives to Storage Area Networks
Disk subsystems span the range of configuration complexity from single disk drives to large installations of disk arrays. They can be directly attached to individual computer syst...
Thomas Ruwart
SSDBM
2000
IEEE
87views Database» more  SSDBM 2000»
15 years 8 months ago
A Tool for Nesting and Clustering Large Objects
In implementations of non-standard database systems, large objects are often embedded within an aggregate of different types, i.e. a tuple. For a given size and access probabilit...
Stefan Dieker, Ralf Hartmut Güting, Miguel Ro...
TOOLS
2000
IEEE
15 years 8 months ago
Extending Business Objects with Business Rules
It is common to imbed business rules within the code of distributed object systems. When business practices and/or policies change, as they often do, it is difficult if not imposs...
Isabelle Rouvellou, Lou Degenaro, Kevin Rasmus, Da...