Sciweavers

1777 search results - page 173 / 356
» Surveillance Event Detection
Sort
View
313
Voted
NETGAMES
2006
ACM
15 years 9 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
136
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile Networks
—The publish/subscribe (pub/sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extending a pub/sub system in ...
Quan Yuan, Jie Wu
146
Voted
ACSD
2006
IEEE
154views Hardware» more  ACSD 2006»
15 years 9 months ago
Concurrency in Distributed Systems under Autonomous and Enforced Actions
Recently, the formal approach of I–Systems has been newly hed through an abstract axiomatic system where events in system components are solely derived and defined from their b...
Arnim Wedig, Horst F. Wedde, Anca M. Lazarescu, El...
127
Voted
COMAD
2009
15 years 4 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
128
Voted
ICDM
2009
IEEE
200views Data Mining» more  ICDM 2009»
15 years 1 months ago
Improving SVM Classification on Imbalanced Data Sets in Distance Spaces
Abstract--Imbalanced data sets present a particular challenge to the data mining community. Often, it is the rare event that is of interest and the cost of misclassifying the rare ...
Suzan Koknar-Tezel, Longin Jan Latecki