Sciweavers

5816 search results - page 981 / 1164
» Distributed Management by Delegation
Sort
View
CCS
2010
ACM
15 years 4 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
CIKM
2010
Springer
15 years 4 months ago
Partial drift detection using a rule induction framework
The major challenge in mining data streams is the issue of concept drift, the tendency of the underlying data generation process to change over time. In this paper, we propose a g...
Damon Sotoudeh, Aijun An
IEEECIT
2010
IEEE
15 years 4 months ago
Metadata-Based Adaptive Sampling for Energy-Efficient Collaborative Target Tracking in Wireless Sensor Networks
—The increasingly complex roles for which Wireless Sensor Networks (WSNs) are being employed have driven the desire for energy-efficient reliable target tracking. In this paper, ...
Yousef E. M. Hamouda, Chris Phillips
165
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
JUCS
2010
98views more  JUCS 2010»
15 years 3 months ago
Mobile Agent-based Context-aware Services
: This paper presents an agent-based system for building and operating agent-based context-aware services in public spaces, including museums. The system provides users with agents...
Ichiro Satoh