Sciweavers

907 search results - page 171 / 182
» Monitoring of Real-Time Properties
Sort
View
127
Voted
CCS
2009
ACM
15 years 10 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
132
Voted
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
15 years 10 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
121
Voted
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 10 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
132
Voted
CSE
2009
IEEE
15 years 10 months ago
Socio-semantic Dynamics in a Blog Network
—The blogosphere can be construed as a knowledge network made of bloggers who are interacting through a social network to share, exchange or produce information. We claim that th...
Jean-Philippe Cointet, Camille Roth
166
Voted
ICDCSW
2009
IEEE
15 years 10 months ago
Embedded Virtual Machines for Robust Wireless Control Systems
Embedded wireless networks have largely focused on openloop sensing and monitoring. To address actuation in closedloop wireless control systems there is a strong need to re-think ...
Rahul Mangharam, Miroslav Pajic