Sciweavers

1661 search results - page 275 / 333
» Distributed Top-K Monitoring
Sort
View
DEBU
2008
104views more  DEBU 2008»
13 years 10 months ago
Process Mining in Web Services: The WebSphere Case
Process mining has emerged as a way to discover or check the conformance of processes based on event logs. This enables organizations to learn from processes as they really take p...
Wil M. P. van der Aalst, H. M. W. (Eric) Verbeek
CN
2006
82views more  CN 2006»
13 years 10 months ago
Event-condition-action rules on RDF metadata in P2P environments
RDF is one of the technologies proposed to realise the vision of the Semantic Web and it is being increasingly used in distributed web-based applications. The use of RDF in applic...
George Papamarkos, Alexandra Poulovassilis, Peter ...
ENTCS
2006
175views more  ENTCS 2006»
13 years 10 months ago
Observing Internet Worm and Virus Attacks with a Small Network Telescope
A network telescope is a portion of the IP address space which is devoted to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious ...
Uli Harder, Matt W. Johnson, Jeremy T. Bradley, Wi...
IJSNET
2008
114views more  IJSNET 2008»
13 years 10 months ago
PERT: a new power-efficient real-time packet delivery scheme for sensor networks
Abstract: We present PERT, a power-efficient scheme to deliver real-time data packets in sensor networks. Time-sensitive sensor data is common in applications such as hazard monito...
Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar
IOR
2008
148views more  IOR 2008»
13 years 10 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...