Sciweavers

1661 search results - page 270 / 333
» Distributed Top-K Monitoring
Sort
View
EATIS
2009
ACM
14 years 1 months ago
Agent based smart house platform with affective control
In this paper, we describe our work in developing an agent based smart house platform using TAOM4E development methodology and the JADE-platform with the Jadex-extension. In order...
Kuderna-Iulian Benta, Amalia Hoszu, Lucia Vacariu,...
FLAIRS
2007
14 years 11 days ago
Managing Dynamic Contexts Using Failure-Driven Stochastic Models
We describe an architecture for representing and managing context shifts that supports dynamic data interpretation. This architecture utilizes two layers of learning and three lay...
Nikita A. Sakhanenko, George F. Luger, Carl R. Ste...
USENIX
2007
14 years 10 days ago
Hyperion: High Volume Stream Archival for Retrospective Querying
Network monitoring systems that support data archival and after-the-fact (retrospective) queries are useful for a multitude of purposes, such as anomaly detection and network and ...
Peter Desnoyers, Prashant J. Shenoy
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
13 years 12 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
ESORICS
2008
Springer
13 years 11 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...