Sciweavers

6689 search results - page 1262 / 1338
» A Network Security Monitor
Sort
View
IUI
2010
ACM
14 years 6 months ago
Mobia Modeler: easing the creation process of mobile applications for non-technical users
The development of mobile applications has now extended from mobile network providers into the hands of ordinary people as organizations and companies encourage people to come up ...
Florence T. Balagtas-Fernandez, Max Tafelmayer, He...
OZCHI
2009
ACM
14 years 4 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
GLOBECOM
2009
IEEE
14 years 4 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
ICAC
2009
IEEE
14 years 4 months ago
Ranking the importance of alerts for problem determination in large computer systems
The complexity of large computer systems has raised unprecedented challenges for system management. In practice, operators often collect large volume of monitoring data from system...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira, Akhil...
ICASSP
2009
IEEE
14 years 4 months ago
Long-time span acoustic activity analysis from far-field sensors in smart homes
Smart homes for the aging population have recently started attracting the attention of the research community. One of the problems of interest is this of monitoring the activities...
Jing Huang, Xiaodan Zhuang, Vit Libal, Gerasimos P...
« Prev « First page 1262 / 1338 Last » Next »