Sciweavers

2210 search results - page 349 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
APSCC
2008
IEEE
15 years 4 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
PERVASIVE
2008
Springer
15 years 2 months ago
Providing an Integrated User Experience of Networked Media, Devices, and Services through End-User Composition
Networked devices for the storage and rendering of digital media are rapidly becoming ubiquitous in homes throughout the industrialized world. Existing approaches to home media con...
Mark W. Newman, Ame Elliott, Trevor F. Smith
PERVASIVE
2011
Springer
14 years 5 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
ADAPTIVE
2007
Springer
15 years 8 months ago
Case-Based Recommendation
Abstract. Data Mining, or Knowledge Discovery as it is also known, is becoming increasingly useful in a wide variety of applications. In the following paper, we look at its use in ...
Barry Smyth
VLDB
2007
ACM
166views Database» more  VLDB 2007»
15 years 8 months ago
To Share or Not To Share?
Intuitively, aggressive work sharing among concurrent queries in a database system should always improve performance by eliminating redundant computation or data accesses. We show...
Ryan Johnson, Nikos Hardavellas, Ippokratis Pandis...