Sciweavers

7596 search results - page 1402 / 1520
» Challenges in forensic computing
Sort
View
EDBT
2008
ACM
206views Database» more  EDBT 2008»
16 years 4 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo
ICSE
2007
IEEE-ACM
16 years 4 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
155
Voted
PERCOM
2008
ACM
16 years 3 months ago
ReMo : An Energy Efficient Reprogramming Protocol for Mobile Sensor Networks
Existing code update protocols for reprogramming nodes in a sensor network are either unsuitable or inefficient when used in a mobile environment. The prohibitive factor of uncert...
Pradip De, Yonghe Liu, Sajal K. Das
PERCOM
2007
ACM
16 years 3 months ago
A Scalable Geographic Service Provision Framework for Mobile Ad Hoc Networks
Supporting scalable and efficient routing and service provision in Mobile Ad Hoc Networks (MANET) has been a big research challenge. Conventional topology-based unicast and multic...
Xiaojing Xiang, Xin Wang
PERCOM
2007
ACM
16 years 3 months ago
Context Aware Routing of Enterprise User Communications
This paper develops a context aware framework to address the diverse communication needs of a modern enterprise. Such enterprises are characterized by workers in different locatio...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
« Prev « First page 1402 / 1520 Last » Next »