Sciweavers

1579 search results - page 276 / 316
» Simulation Model for Self-Adaptive Applications in Pervasive...
Sort
View
ISMIS
2009
Springer
14 years 3 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
ICDCS
2008
IEEE
14 years 3 months ago
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...
ICPR
2008
IEEE
14 years 3 months ago
Approximation of salient contours in cluttered scenes
This paper proposes a new approach to describe the salient contours in cluttered scenes. No need to do the preprocessing, such as edge detection, we directly use a set of random s...
Rui Huang, Nong Sang, Qiling Tang
ICEBE
2007
IEEE
115views Business» more  ICEBE 2007»
14 years 3 months ago
A Concurrent G-Negotiation Mechanism for Grid Resource Co-allocation
Since computationally intensive applications may often require more resources than a single computing machine can provide in one administrative domain, bolstering resource co-allo...
Benyun Shi, Kwang Mong Sim
CCS
2007
ACM
14 years 3 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...