Sciweavers

282 search results - page 41 / 57
» Improved Thumbprint and Its Application for Intrusion Detect...
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...
Lirong Jian, Zheng Yang, Yunhao Liu
164
Voted
ESWA
2011
428views Database» more  ESWA 2011»
14 years 4 months ago
Formally analysing the concepts of domestic violence
The types of police inquiries performed these days are incredibly diverse. Often data processing architectures are not suited to cope with this diversity since most of the case dat...
Jonas Poelmans, Paul Elzinga, Stijn Viaene, Guido ...
JIDM
2010
145views more  JIDM 2010»
14 years 8 months ago
Mining Relevant and Extreme Patterns on Climate Time Series with CLIPSMiner
One of the most important challenges for the researchers in the 21st Century is related to global heating and climate change that can have as consequence the intensification of na...
Luciana A. S. Romani, Ana Maria Heuminski de &Aacu...
78
Voted
CGO
2007
IEEE
15 years 3 months ago
SuperPin: Parallelizing Dynamic Instrumentation for Real-Time Performance
Dynamic instrumentation systems have proven to be extremely valuable for program introspection, architectural simulation, and bug detection. Yet a major drawback of modern instrum...
Steven Wallace, Kim M. Hazelwood
SRDS
2000
IEEE
15 years 1 months ago
Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agreement Problems
Fault-tolerance is fundamental to the further development of mobile agent applications. In the context of mobile agents, fault-tolerance prevents a partial or complete loss of the...
Stefan Pleisch, André Schiper