Sciweavers

2236 search results - page 437 / 448
» Intrusion detection techniques and approaches
Sort
View
MOBISYS
2009
ACM
14 years 8 months ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
SIGMOD
2009
ACM
180views Database» more  SIGMOD 2009»
14 years 8 months ago
Indexing correlated probabilistic databases
With large amounts of correlated probabilistic data being generated in a wide range of application domains including sensor networks, information extraction, event detection etc.,...
Bhargav Kanagal, Amol Deshpande
PLDI
2009
ACM
14 years 2 months ago
Error propagation analysis for file systems
Unchecked errors are especially pernicious in operating system file management code. Transient or permanent hardware failures are inevitable, and error-management bugs at the fi...
Cindy Rubio-González, Haryadi S. Gunawi, Be...
ISCA
2009
IEEE
158views Hardware» more  ISCA 2009»
14 years 2 months ago
Boosting single-thread performance in multi-core systems through fine-grain multi-threading
Industry has shifted towards multi-core designs as we have hit the memory and power walls. However, single thread performance remains of paramount importance since some applicatio...
Carlos Madriles, Pedro López, Josep M. Codi...
BPM
2009
Springer
340views Business» more  BPM 2009»
14 years 2 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...