Sciweavers

1661 search results - page 276 / 333
» Distributed Top-K Monitoring
Sort
View
JCP
2006
106views more  JCP 2006»
13 years 10 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
NAR
2006
86views more  NAR 2006»
13 years 10 months ago
ISfinder: the reference centre for bacterial insertion sequences
ISfinder (www-is.biotoul.fr) is a dedicated database for bacterial insertion sequences (ISs). It has superseded the Stanford reference center. One of its functions is to assign IS...
P. Siguier, J. Perochon, L. Lestrade, J. Mahillon,...
PERVASIVE
2006
Springer
13 years 10 months ago
Modeling Human Behavior from Simple Sensors in the Home
Pervasive sensors in the home have a variety of applications including energy minimization, activity monitoring for elders, and tutors for household tasks such as cooking. Many of ...
Ryan Aipperspach, Elliot Cohen, John F. Canny
PUC
2006
89views more  PUC 2006»
13 years 10 months ago
Using ubiquitous computing in interactive mobile marketing
Unique features of handheld devices, including their mobility, personalization and location-awareness engender new types of applications for mobile commerce, such as mobile adverti...
Stan Kurkovsky, Karthik Harihar
SIGKDD
2008
149views more  SIGKDD 2008»
13 years 10 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...