Sciweavers

1661 search results - page 247 / 333
» Distributed Top-K Monitoring
Sort
View
ASC
2007
15 years 8 months ago
A BDI Agent System for Credit Risk Assessment based on Fuzzy Logic
Credit risk has always been an important issue for banks and other financial intermediaries. A reliable and consistent computing system is necessary to simplify the decision mak...
S. Bonura, V. Morreale, G. Cammarata, F. Cantore,...
ICDCS
2009
IEEE
15 years 7 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
WACV
2005
IEEE
15 years 5 months ago
Detecting Motion Patterns via Direction Maps with Application to Surveillance
To facilitate accurate and efficient detection of motion patterns in video data, it is desirable to abstract from pixel intensity values to representations that explicitly and co...
Jacob M. Gryn, Richard P. Wildes, John K. Tsotsos
WWW
2010
ACM
15 years 4 months ago
Analyzing content-level properties of the web adversphere
Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. In thi...
Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic,...
PERVASIVE
2010
Springer
15 years 4 months ago
Common Sense Community: Scaffolding Mobile Sensing and Analysis for Novice Users
As sensing technologies become increasingly distributed and democratized, citizens and novice users are becoming responsible for the kinds of data collection and analysis that have...
Wesley Willett, Paul M. Aoki, Neil Kumar, Sushmita...