Sciweavers

6656 search results - page 1181 / 1332
» Change, Change, Change: Three Approaches
Sort
View
TRIDENTCOM
2006
IEEE
14 years 3 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
14 years 2 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
ICDM
2005
IEEE
146views Data Mining» more  ICDM 2005»
14 years 2 months ago
On the Stationarity of Multivariate Time Series for Correlation-Based Data Analysis
Multivariate time series (MTS) data sets are common in various multimedia, medical and financial application domains. These applications perform several data-analysis operations ...
Kiyoung Yang, Cyrus Shahabi
KBSE
2005
IEEE
14 years 2 months ago
Clearwater: extensible, flexible, modular code generation
Distributed applications typically interact with a number of heterogeneous and autonomous components that evolve independently. Methodical development of such applications can ben...
Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
14 years 2 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
« Prev « First page 1181 / 1332 Last » Next »