Sciweavers

1661 search results - page 307 / 333
» Distributed Top-K Monitoring
Sort
View
SENSYS
2009
ACM
14 years 4 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke
CCS
2009
ACM
14 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
14 years 4 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
CRV
2009
IEEE
237views Robotics» more  CRV 2009»
14 years 4 months ago
SEC: Stochastic Ensemble Consensus Approach to Unsupervised SAR Sea-Ice Segmentation
The use of synthetic aperture radar (SAR) has become an integral part of sea-ice monitoring and analysis in the polar regions. An important task in sea-ice analysis is to segment ...
Alexander Wong, David A. Clausi, Paul W. Fieguth
ICAC
2009
IEEE
14 years 4 months ago
AdaptGuard: guarding adaptive systems from instability
In this paper, we design, implement and evaluate AdaptGuard, a software service for guarding adaptive systems, such as QoS-adaptive servers, from instability caused by software an...
Jin Heo, Tarek F. Abdelzaher