Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Finding patterns in large, real, spatio/temporal data continues to attract high interest (e.g., sales of products over space and time, patterns in mobile phone users; sensor netwo...
Anastassia Ailamaki, Christos Faloutsos, Paul S. F...
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...