Sciweavers

4039 search results - page 634 / 808
» A Method for Dynamic Clustering of Data
Sort
View
ATAL
2008
Springer
15 years 6 months ago
A mobile agent approach to opportunistic harvesting in wireless sensor networks
This demonstration illustrates the feasibility of harvesting data from a WSN by interested parties, either in the WSN coverage area or in a remote location. Embedded and mobile ag...
Richard Tynan, Conor Muldoon, Michael J. O'Grady, ...
CGO
2003
IEEE
15 years 8 months ago
METRIC: Tracking Down Inefficiencies in the Memory Hierarchy via Binary Rewriting
In this paper, we present METRIC, an environment for determining memory inefficiencies by examining data traces. METRIC is designed to alter the performance behavior of applicatio...
Jaydeep Marathe, Frank Mueller, Tushar Mohan, Bron...
ICDM
2010
IEEE
101views Data Mining» more  ICDM 2010»
15 years 2 months ago
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system that re...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chi...
ALGORITHMICA
2006
139views more  ALGORITHMICA 2006»
15 years 4 months ago
CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets
Abstract. In this paper we present a coarse-grained parallel algorithm, CONQUEST, for constructing boundederror summaries of high-dimensional binary attributed data in a distribute...
Jie Chi, Mehmet Koyutürk, Ananth Grama
NCA
2007
IEEE
15 years 10 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ï...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...