Sciweavers

2357 search results - page 284 / 472
» Computing Refactorings of Behavior Models
Sort
View
120
Voted
SAC
2009
ACM
15 years 10 months ago
Link-based event detection in email communication networks
People’s email communications can be modeled as graphs with vertices representing email accounts and edges representing email communications. Email communication data usually co...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
125
Voted
DSN
2006
IEEE
15 years 9 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
132
Voted
DCOSS
2005
Springer
15 years 9 months ago
Macro-programming Wireless Sensor Networks Using Kairos
The literature on programming sensor networks has focused so far on g higher-level abstractions for expressing local node behavior. Kairos is a natural next step in sensor network ...
Ramakrishna Gummadi, Omprakash Gnawali, Ramesh Gov...
226
Voted
ICMI
2004
Springer
128views Biometrics» more  ICMI 2004»
15 years 8 months ago
GroupMedia: distributed multi-modal interfaces
In this paper, we describe the GroupMedia system, which uses wireless wearable computers to measure audio features, headmovement, and galvanic skin response (GSR) for dyads and gr...
Anmol Madan, Ron Caneel, Alex Pentland
136
Voted
IPPS
2003
IEEE
15 years 8 months ago
Homeostatic and Tendency-Based CPU Load Predictions
The dynamic nature of a resource-sharing environment means that applications must be able to adapt their behavior in response to changes in system status. Predictions of future sy...
Lingyun Yang, Ian T. Foster, Jennifer M. Schopf