Sciweavers

2912 search results - page 291 / 583
» Overlay Networks - Implementation by Specification
Sort
View
RAID
2000
Springer
15 years 8 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
P2PKM
2004
15 years 5 months ago
RDFGrowth, a P2P annotation exchange algorithm for scalable Semantic Web applications
We present RDFGrowth, an algorithm that addresses a specific yet important scenario: large scale, end user targeted, metadata exchange P2P applications. In this scenario, peers per...
Giovanni Tummarello, Christian Morbidoni, Joackin ...
PERCOM
2007
ACM
16 years 4 months ago
Designing Ubiquitous Computing Systems for Sports Equipment
In this paper, we report on a user-centered, iterative design process for augmenting sports equipment with ubiquitous computing technology. In several design iterations, a fully w...
Matthias Kranz, Wolfgang Spiessl, Albrecht Schmidt
PERCOM
2006
ACM
16 years 4 months ago
Unearthing Design Patterns to Support Context-Awareness
The lack of structured methodologies and software engineering efforts on designing the support of contextawareness in pervasive systems hinders the potential advantages of analyzi...
Oriana Riva, Cristiano di Flora, Stefano Russo, Ki...
DATE
2003
IEEE
113views Hardware» more  DATE 2003»
15 years 9 months ago
Design Space Exploration for a Wireless Protocol on a Reconfigurable Platform
This paper describes a design space exploration experiment for a real application from the embedded networking domain - the physical layer of a wireless protocol. The application ...
Laura Vanzago, Bishnupriya Bhattacharya, Joel Camb...