Sciweavers

1859 search results - page 368 / 372
» Using Problems to Learn Service-Oriented Computing
Sort
View
RAID
2009
Springer
15 years 4 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
IPPS
2007
IEEE
15 years 3 months ago
Optimizing the Fast Fourier Transform on a Multi-core Architecture
The rapid revolution in microprocessor chip architecture due to multicore technology is presenting unprecedented challenges to the application developers as well as system softwar...
Long Chen, Ziang Hu, Junmin Lin, Guang R. Gao
ACMDIS
2006
ACM
15 years 3 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
JUCS
2008
156views more  JUCS 2008»
14 years 9 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
PVLDB
2010
175views more  PVLDB 2010»
14 years 8 months ago
Dynamic Join Optimization in Multi-Hop Wireless Sensor Networks
To enable smart environments and self-tuning data centers, we are developing the Aspen system for integrating physical sensor data, as well as stream data coming from machine logi...
Svilen R. Mihaylov, Marie Jacob, Zachary G. Ives, ...