Applications that query data streams in order to identify trends, patterns, or anomalies can often benefit from comparing the live stream data with archived historical stream dat...
Frederick Reiss, Kurt Stockinger, Kesheng Wu, Arie...
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
The user profile is one of the main context-information in a wide range of pervasive computing applications. Modern handheld devices provided with localization capabilities could a...
Given mobile phone penetration statistics and current mobile phone technical specifications, it is apparent that in developed countries, the majority of citizens carry not just mo...
Andreas Komninos, Peter Barrie, Julian Newman, Stu...
Abstract. The last advances in commodity hardware have allowed users of immersive visualization to create high-performance systems using a set of interconnected computers. These sy...
Aron Bierbaum, Patrick Hartling, Pedro Morillo, Ca...