Sciweavers

17983 search results - page 3352 / 3597
» Set Types and Applications
Sort
View
KDD
2000
ACM
101views Data Mining» more  KDD 2000»
15 years 8 months ago
Incremental quantile estimation for massive tracking
Data--call records, internet packet headers, or other transaction records--are coming down a pipe at a ferocious rate, and we need to monitor statistics of the data. There is no r...
Fei Chen, Diane Lambert, José C. Pinheiro
146
Voted
NDSS
2000
IEEE
15 years 8 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
FOCS
1995
IEEE
15 years 8 months ago
Disjoint Paths in Densely Embedded Graphs
We consider the following maximum disjoint paths problem (mdpp). We are given a large network, and pairs of nodes that wish to communicate over paths through the network — the g...
Jon M. Kleinberg, Éva Tardos
194
Voted
ICIP
1997
IEEE
15 years 8 months ago
Object Based Video with Progressive Foreground
A novel algorithm is described for coding objects in video compression systems which gives complete control over the bit allocation to the video objects. The method is evaluated b...
Donald M. Monro, Huijuan Li, J. A. Nicholls
ICPP
1997
IEEE
15 years 8 months ago
The Affinity Entry Consistency Protocol
In this paper we propose a novel software-only distributed sharedmemory system (SW-DSM), the Affinity Entry Consistency (AEC) protocol. The protocol is based on Entry Consistency ...
Cristiana Bentes Seidel, Ricardo Bianchini, Claudi...
« Prev « First page 3352 / 3597 Last » Next »