Sciweavers

989 search results - page 171 / 198
» Intelligent Remote Monitoring
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 7 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
15 years 7 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...
JCP
2007
143views more  JCP 2007»
15 years 1 months ago
Alternatives for In-Service BER Estimation in All-Optical Networks: Towards Minimum Intrusion
— Combining the existing approaches for optical intelligence and the speed and capacity of light is undoubtedly the only viable strategy for building future-proof, highspeed netw...
Carolina Pinart
COMPUTER
2004
179views more  COMPUTER 2004»
15 years 1 months ago
Environmental Sensor Networks
Environmental Sensor Networks (ESNs) facilitate the study of fundamental processes and the development of hazard response systems. They have evolved from passive logging systems t...
Kirk Martinez, Jane K. Hart, Royan Ong
TIM
2010
168views Education» more  TIM 2010»
14 years 8 months ago
Thermal Event Recognition Applied to Protection of Tokamak Plasma-Facing Components
Magnetic confinement fusion tokamaks are complex devices where a large amount of power is required to make the fusion reactions happen. In such experimental conditions, Plasma Faci...
Vincent Martin, Jean-Marcel Travere, Franço...