Sciweavers

453 search results - page 24 / 91
» Fault-Tolerant Techniques for Ambient Intelligent Distribute...
Sort
View
ACSAC
2007
IEEE
15 years 8 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
PDPTA
2003
15 years 3 months ago
Load Balancing Voice Applications with Piranha
In this paper, we investigate the load balancing problem among a cluster of mobile and fixed devices in a voice enabled interface. We consider a design approach. The voice interfa...
Mustapha Hadim, Pierre Manneback, Michel Bagein, P...
HICSS
2002
IEEE
111views Biometrics» more  HICSS 2002»
15 years 7 months ago
Intelligent Workflow Techniques for Distributed Group Facilitation
Distributed group facilitation techniques are becoming a necessity because many of the face-toface facilitation techniques are no longer suitable in a distributed environment. Alt...
Jay F. Nunamaker, J. Leon Zhao, Robert O. Briggs
EDOC
2007
IEEE
15 years 8 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey
EUSAI
2003
Springer
15 years 7 months ago
Correlating Sensors and Activities in an Intelligent Environment: A Logistic Regression Approach
An important problem in intelligent environments is how the system can identify and model users’ activities. This paper describes a new technique for identifying correlations be...
Fahd Al-Bin-Ali, Prasad Boddupalli, Nigel Davies, ...