Sciweavers

4998 search results - page 131 / 1000
» The case for intentional networking
Sort
View
DSN
2000
IEEE
15 years 2 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
IPPS
1999
IEEE
15 years 2 months ago
An Adaptive, Fault-Tolerant Implementation of BSP for JAVA-Based Volunteer Computing Systems
Abstract. In recent years, there has been a surge of interest in Javabased volunteer computing systems, which aim to make it possible to build very large parallel computing network...
Luis F. G. Sarmenta
AVSS
2007
IEEE
15 years 2 months ago
A LQR spatiotemporal fusion technique for face profile collection in smart camera surveillance
In this paper, we propose a joint face orientation estimation in smart camera networks without having to localize the cameras in advance. The system is composed of in-node coarse ...
Chung-Ching Chang, Hamid K. Aghajan
ISN
1995
Springer
15 years 1 months ago
Intelligent Remote Monitoring
Intelligent monitoring facilities are of paramount importance in both service and network management as they provide the capability to monitor quality of service and utilisation pa...
George Pavlou, Kevin M. T. McCarthy, George Mykoni...
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
14 years 12 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis