Sciweavers

4401 search results - page 714 / 881
» Computing with Default Logic
Sort
View
DCOSS
2008
Springer
13 years 12 months ago
Distributed Activity Recognition with Fuzzy-Enabled Wireless Sensor Networks
Wireless sensor nodes can act as distributed detectors for recognizing activities online, with the final goal of assisting the users in their working environment. We propose an act...
Mihai Marin-Perianu, Clemens Lombriser, Oliver Amf...
DEBS
2008
ACM
13 years 12 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
DSOM
2008
Springer
13 years 12 months ago
Web-Based Management of Content Delivery Networks
Abstract overlay networks have been considered enablers of efficient management for decentralized, large scale service deployments. A Content Delivery Network (CDN) is an example o...
George C. Oikonomou, Theodore K. Apostolopoulos
DSVIS
2008
Springer
13 years 12 months ago
Toward Multi-disciplinary Model-Based (Re)Design of Sustainable User Interfaces
This paper reports on our experience in using the MuiCSer process framework for the redesign of the user interface for operating an industrial digital printing system. MuiCSer is c...
Jan Van den Bergh, Mieke Haesen, Kris Luyten, Sofi...
EDCC
2008
Springer
13 years 12 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger