Sciweavers

3104 search results - page 557 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
107
Voted
NSPW
2004
ACM
15 years 9 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
114
Voted
CMMR
2004
Springer
98views Music» more  CMMR 2004»
15 years 9 months ago
Separating Voices in Polyphonic Music: A Contig Mapping Approach
Abstract. Voice separation is a critical component of music information retrieval, music analysis and automated transcription systems. We present a contig mapping approach to voice...
Elaine Chew, Xiaodan Wu
127
Voted
HSNMC
2004
Springer
158views Multimedia» more  HSNMC 2004»
15 years 9 months ago
HMM-Based Monitoring of Packet Channels
Abstract. Performance of real-time applications on network communication channels are strongly related to losses and temporal delays. Several studies showed that these network feat...
Pierluigi Salvo Rossi, Francesco Palmieri, Giulio ...
108
Voted
SENSYS
2003
ACM
15 years 9 months ago
An evaluation of multi-resolution storage for sensor networks
Wireless sensor networks enable dense sensing of the environment, offering unprecedented opportunities for observing the physical world. Centralized data collection and analysis a...
Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy...
143
Voted
SIGIR
2003
ACM
15 years 9 months ago
HAT: a hardware assisted TOP-DOC inverted index component
A novel Hardware Assisted Top-Doc (HAT) component is disclosed. HAT is an optimized content indexing device based on a modified inverted index structure. HAT accommodates patterns...
S. Kagan Agun, Ophir Frieder