Sciweavers

2821 search results - page 496 / 565
» Tracing a single user
Sort
View
ICDE
2011
IEEE
274views Database» more  ICDE 2011»
14 years 3 months ago
SQPR: Stream query planning with reuse
—When users submit new queries to a distributed stream processing system (DSPS), a query planner must allocate physical resources, such as CPU cores, memory and network bandwidth...
Evangelia Kalyvianaki, Wolfram Wiesemann, Quang Hi...
AINA
2010
IEEE
14 years 3 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
CHI
2011
ACM
14 years 3 months ago
Geckos: combining magnets and pressure images to enable new tangible-object design and interaction
In this paper we present Geckos, a new type of tangible objects which are tracked using a Force-Sensitive Resistance sensor. Geckos are based on low-cost permanent magnets and can...
Jakob Leitner, Michael Haller
INFOCOM
2011
IEEE
14 years 3 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
NAR
2011
188views Computer Vision» more  NAR 2011»
14 years 2 months ago
The Gene Expression Barcode: leveraging public data repositories to begin cataloging the human and murine transcriptomes
Various databases have harnessed the wealth of publicly available microarray data to address biological questions ranging from across-tissue differential expression to homologous ...
Matthew N. McCall, Karan Uppal, Harris A. Jaffee, ...