Sciweavers

796 search results - page 145 / 160
» Problem Generation: Evaluation of Two Domains in Operating S...
Sort
View
ICAC
2009
IEEE
15 years 4 months ago
Resilient workload manager: taming bursty workload of scaling internet applications
In data centers hosting scaling Internet applications, operators face the tradeoff dilemma between resource efficiency and Quality of Service (QoS), and the root cause lies in wo...
Hui Zhang 0002, Guofei Jiang, Kenji Yoshihira, Hai...
CVPR
1998
IEEE
15 years 11 months ago
Action Recognition Using Probabilistic Parsing
A new approach to the recognition of temporal behaviors and activities is presented. The fundamental idea, inspired by work in speech recognition, is to divide the inference probl...
Aaron F. Bobick, Yuri A. Ivanov
ISMAR
2003
IEEE
15 years 2 months ago
Resolving Multiple Occluded Layers in Augmented Reality
A useful function of augmented reality (AR) systems is their ability to visualize occluded infrastructure directly in a user’s view of the environment. This is especially import...
Mark A. Livingston, J. Edward Swan II, Joseph L. G...
CLUSTER
2000
IEEE
15 years 2 months ago
Partition Repositories for Partition Cloning - OS Independent Software Maintenance in Large Clusters of PCs
As a novel approach to software maintenance in large clusters of PCs requiring multiple OS installations we implemented partition cloning and partition repositories as well as a s...
Felix Rauch, Christian Kurmann, Thomas Stricker
ESORICS
2004
Springer
15 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee