Sciweavers

1097 search results - page 124 / 220
» Sequential Object Monitors
Sort
View
109
Voted
AINTEC
2005
Springer
15 years 9 months ago
Users and Services in Intelligent Networks
— We present a vision of an Intelligent Network in which users dynamically indicate their requests for services, and formulate needs in terms of Quality of Service (QoS) and pric...
Erol Gelenbe
VLDB
2005
ACM
159views Database» more  VLDB 2005»
15 years 9 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu
168
Voted
CLEANDB
2006
ACM
312views Database» more  CLEANDB 2006»
15 years 7 months ago
Efficiently Filtering RFID Data Streams
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing ...
Yijian Bai, Fusheng Wang, Peiya Liu
121
Voted
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
15 years 5 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
157
Voted
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 5 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...