Sciweavers

35 search results - page 4 / 7
» Automatic detection of recurring operation patterns
Sort
View
ASSETS
2009
ACM
13 years 5 months ago
Fall and emergency detection with mobile phones
In this demo, we present an application for mobile phones which can monitor physical activities of users and detect unexpected emergency situations such as a sudden fall or accide...
Hamed Ketabdar, Tim Polzehl
MOBILITY
2009
ACM
14 years 1 months ago
Detection of images with adult content for parental control on mobile devices?
In this paper we present a prototype for parental control that detects images with adult content received on a mobile device. More specifically, the application that we developed...
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, ...
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
13 years 5 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...
ICDE
2007
IEEE
187views Database» more  ICDE 2007»
14 years 8 months ago
RFID Data Processing with a Data Stream Query Language
RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...
SEKE
2010
Springer
13 years 5 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li