— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
: This paper provides a methodology to characterize the accuracy of PMU data (GPS-synchronized) and the applicability of this data for monitoring system stability via visualization...
George J. Cokkinides, A. P. Sakis Meliopoulos, Geo...
Data mining algorithms use various Trie and bitmap-based representations to optimize the support (i.e., frequency) counting performance. In this paper, we compare the memory requi...
Client side caching of location dependent queries is an important technique for improving performance of location-based services. Most of the existing research in this area has fo...
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....