Sciweavers

2686 search results - page 250 / 538
» Parallel object monitors
Sort
View
VLDB
2005
ACM
159views Database» more  VLDB 2005»
15 years 10 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu
CLEANDB
2006
ACM
312views Database» more  CLEANDB 2006»
15 years 8 months ago
Efficiently Filtering RFID Data Streams
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing ...
Yijian Bai, Fusheng Wang, Peiya Liu
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
15 years 6 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 6 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
CRIWG
2004
15 years 6 months ago
Ariane: An Awareness Mechanism for Shared Databases
Awareness is an essential requirement in collaborative activities. This paper presents Ariane, a generic and reusable awareness infrastructure, independent of a specific applicatio...
Vaninha Vieira, Marco A. S. Mangan, Cláudia...