For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
This paper reports on a theoretical Bayesian modeling development for residual life prediction in the context of condition-based maintenance. At each monitoring point during a comp...
Hadoop has become a critical component in today’s cloud environment. Ensuring good performance for Hadoop is paramount for the wide-range of applications built on top of it. In ...
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...