Sciweavers

364 search results - page 11 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
EDBT
2008
ACM
159views Database» more  EDBT 2008»
15 years 9 months ago
P2P systems with transactional semantics
Structured P2P systems have been developed for constructing applications at internet scale in cooperative environments and exhibit a number of desirable features such as scalabili...
Shyam Antony, Divyakant Agrawal, Amr El Abbadi
DAC
2008
ACM
14 years 11 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
CHI
2006
ACM
15 years 10 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...
PERCOM
2007
ACM
15 years 9 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
90
Voted
ASPDAC
2005
ACM
130views Hardware» more  ASPDAC 2005»
14 years 11 months ago
Stability analysis of active clock deskewing systems using a control theoretic approach
— In this paper, a methodology for analyzing closed loop clock distribution and active deskewing networks is proposed. An active clock distribution and deskewing network is model...
Vinil Varghese, Tom Chen, Peter Young