Sciweavers

4815 search results - page 835 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
15 years 10 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
VLDB
2007
ACM
96views Database» more  VLDB 2007»
15 years 10 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
COMPSAC
2006
IEEE
15 years 10 months ago
A Communication Virtual Machine
The convergence of data, voice and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has significantly enrich...
Yi Deng, Seyed Masoud Sadjadi, Peter J. Clarke, Ch...
SKG
2005
IEEE
15 years 9 months ago
Building Sensor Filter Grids: Information Architecture for the Data Deluge
—We discuss a general architectural approach to knowledge and information management and delivery in distributed systems. Our approach is based on the recognition that time-stamp...
Geoffrey Fox, Mehmet S. Aktas, Galip Aydin, Andrea...
ICFEM
2003
Springer
15 years 9 months ago
Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures
The verification of safety critical systems has become an area of increasing importance in computer science. The notion of reactive system has emerged to concentrate on problems r...
Mickaël Kerboeuf, David Nowak, Jean-Pierre Ta...