Sciweavers

1777 search results - page 291 / 356
» Surveillance Event Detection
Sort
View
WCNC
2010
IEEE
14 years 2 months ago
Experiences and Lessons from Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator
—We describe our experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of th...
Yuri Tselishchev, Athanassios Boulis, Lavy Libman
BPM
2006
Springer
153views Business» more  BPM 2006»
14 years 2 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
FORMATS
2004
Springer
14 years 2 months ago
The Influence of Durational Actions on Time Equivalences
The hierarchy of untimed equivalences is well understood for action-based systems. This is not the case for timed systems, where it is, for example, possible to detect concurrency ...
Harald Fecher
GIS
2009
ACM
14 years 1 months ago
Opportunistic sampling in wireless sensor networks
In an active WSN where user queries are regularly processed, a significant proportion of nodes relay and overhear data generated by other nodes in the network. In this paper, we ...
Muhammad Umer, Egemen Tanin, Lars Kulik
ASPDAC
2005
ACM
72views Hardware» more  ASPDAC 2005»
14 years 7 days ago
TERPS: the embedded reliable processing system
Abstract — TERPS is a fault-tolerant computer design that significantly reduces the threat of electromagnetic interference (EMI), using hardware checkpoint/rollback-recovery. TE...
Hongxia Wang, Samuel Rodríguez, Cagdas Diri...