Sciweavers

1009 search results - page 166 / 202
» Region-based face detection
Sort
View
133
Voted
CLUSTER
2007
IEEE
15 years 10 months ago
Anomaly localization in large-scale clusters
— A critical problem facing by managing large-scale clusters is to identify the location of problems in a system in case of unusual events. As the scale of high performance compu...
Ziming Zheng, Yawei Li, Zhiling Lan
114
Voted
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 10 months ago
TCP HandOff: A Practical TCP Enhancement for Heterogeneous Mobile Environments
— In recent years, many different kinds of wireless access networks have been deployed for the Internet and have become inseparable parts of the Internet. But TCP, the most widel...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
139
Voted
IEEEPACT
2007
IEEE
15 years 10 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
130
Voted
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
15 years 9 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
125
Voted
DSN
2005
IEEE
15 years 9 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...