Sciweavers

1291 search results - page 142 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
SIGMOD
2006
ACM
141views Database» more  SIGMOD 2006»
14 years 9 months ago
Contour map matching for event detection in sensor networks
Many sensor network applications, such as object tracking and disaster monitoring, require effective techniques for event detection. In this paper, we propose a novel event detect...
Wenwei Xue, Qiong Luo, Lei Chen 0002, Yunhao Liu
DEXA
2010
Springer
266views Database» more  DEXA 2010»
13 years 10 months ago
DBOD-DS: Distance Based Outlier Detection for Data Streams
Data stream is a newly emerging data model for applications like environment monitoring, Web click stream, network traffic monitoring, etc. It consists of an infinite sequence of d...
Md. Shiblee Sadik, Le Gruenwald
HPCA
2003
IEEE
14 years 9 months ago
Dynamic Data Dependence Tracking and its Application to Branch Prediction
To continue to improve processor performance, microarchitects seek to increase the effective instruction level parallelism (ILP) that can be exploited in applications. A fundament...
Lei Chen, Steve Dropsho, David H. Albonesi
IROS
2008
IEEE
126views Robotics» more  IROS 2008»
14 years 3 months ago
An optical external localization system and applications to indoor tracking
— Precise robot positioning is important for many applications in indoor environments. Current solutions to the indoor localization problem are either both unreliable and inaccur...
Srujan Linga, Binayak Roy, H. Harry Asada, Daniela...