Sciweavers

907 search results - page 165 / 182
» Monitoring of Real-Time Properties
Sort
View
JCP
2006
106views more  JCP 2006»
13 years 8 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JSAC
2006
165views more  JSAC 2006»
13 years 8 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
MAM
2006
95views more  MAM 2006»
13 years 8 months ago
A selective DVS technique based on battery residual
Conventional research on DVS assumes that the battery, which is the power source of most mobile devices, provides constant power; the battery, however, has unique discharge charac...
Sukwon Choi, Hojung Cha, Rhan Ha
MMS
2006
13 years 8 months ago
Information assimilation framework for event detection in multimedia surveillance systems
Most multimedia surveillance and monitoring systems nowadays utilize multiple types of sensors to detect events of interest as and when they occur in the environment. However, due...
Pradeep K. Atrey, Mohan S. Kankanhalli, Ramesh Jai...
MOR
2007
100views more  MOR 2007»
13 years 7 months ago
On Scheduling Fees to Prevent Merging, Splitting, and Transferring of Jobs
A deterministic server is shared by users with identical linear waiting costs, requesting jobs of arbitrary lengths. Shortest jobs are served first for efficiency. The server can...
Hervé Moulin