Sciweavers

1665 search results - page 188 / 333
» Monitoring Timing Constraints in Distributed Real-Time Syste...
Sort
View
146
Voted
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 4 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
RTCSA
2008
IEEE
15 years 10 months ago
Reward Maximization for Embedded Systems with Renewable Energies
Renewable energies can enable embedded systems to be functional indefinitely. In particular for small autonomous sensors, energy harvesting techniques have attracted much interes...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
HICSS
2009
IEEE
112views Biometrics» more  HICSS 2009»
15 years 10 months ago
Optimal Pumping Schedule and Salinity Control in a Coastal Aquifer: a Decision Support System
Proper management of coastal wells is important in order to satisfy demand, minimize costs, control salinity increase, and ultimately to define water resource strategies which are...
T. Ka'eo Duarte, Riccardo Minciardi, Michela Robba...
125
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...
INFOCOM
2008
IEEE
15 years 10 months ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin