Sciweavers

488 search results - page 82 / 98
» Derivation of Java Monitors
Sort
View
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 7 months ago
Analyzing Abnormal Events from Spatio-temporal Trajectories
Advances in RFID based sensor technologies has been used in applications which requires the tracking of assets, products and individuals. The recording of such movements is capture...
Dhaval Patel, Chidansh Bhatt, Wynne Hsu, Mong-Li L...
104
Voted
GEOINFORMATICA
2011
14 years 4 months ago
Qualitative change detection using sensor networks based on connectivity information
The research reported in this paper uses wireless sensor networks to provide salient information about spatially distributed dynamic fields, such as regional variations in tempera...
Jixiang Jiang, Michael F. Worboys, Silvia Nittel
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 4 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
ICDE
2011
IEEE
217views Database» more  ICDE 2011»
14 years 1 months ago
Partitioning techniques for fine-grained indexing
— Many data-intensive websites use databases that grow much faster than the rate that users access the data. Such growing datasets lead to ever-increasing space and performance o...
Eugene Wu 0002, Samuel Madden
EUROSYS
2007
ACM
15 years 6 months ago
Latency and bandwidth-minimizing failure detectors
Failure detectors are fundamental building blocks in distributed systems. Multi-node failure detectors, where the detector is tasked with monitoring N other nodes, play a critical...
Kelvin C. W. So, Emin Gün Sirer