Sciweavers

4693 search results - page 792 / 939
» Verifying Hybrid Systems
Sort
View
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
16 years 1 months ago
Ranking queries on uncertain data: a probabilistic threshold approach
Uncertain data is inherent in a few important applications such as environmental surveillance and mobile object tracking. Top-k queries (also known as ranking queries) are often n...
Ming Hua, Jian Pei, Wenjie Zhang, Xuemin Lin
110
Voted
ICSE
2008
IEEE-ACM
16 years 1 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
91
Voted
PERCOM
2007
ACM
16 years 18 days ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
MOBISYS
2007
ACM
16 years 18 days ago
Accelerometer-based human abnormal movement detection in wireless sensor networks
Wireless sensor networks have become increasingly common in everyday applications due to decreasing technology costs and improved product reliability. An ideal application for wire...
T. Ryan Burchfield, S. Venkatesan
MOBISYS
2007
ACM
16 years 18 days ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang