Sciweavers

3318 search results - page 559 / 664
» The Weak Instance Model
Sort
View
SSD
2007
Springer
116views Database» more  SSD 2007»
14 years 4 months ago
Continuous Constraint Query Evaluation for Spatiotemporal Streams
In this paper we study the evaluation of continuous constraint queries (CCQs) for spatiotemporal streams. A CCQ triggers an alert whenever a configuration of constraints between s...
Marios Hadjieleftheriou, Nikos Mamoulis, Yufei Tao
ACSD
2006
IEEE
105views Hardware» more  ACSD 2006»
14 years 4 months ago
Throughput Analysis of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) are a useful tool for modeling and analyzing embedded data flow applications, both in a single processor and a multiprocessing context or for...
Amir Hossein Ghamarian, Marc Geilen, Sander Stuijk...
AINA
2006
IEEE
14 years 4 months ago
Simulation Architecture for Data Processing Algorithms in Wireless Sensor Networks
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...
Yann-Aël Le Borgne, Mehdi Moussaid, Gianluca ...
AIPR
2006
IEEE
14 years 4 months ago
Recovering Spheres from 3D Point Data
The National Institute of Standards and Technology is involved in developing standard protocols for the performance evaluation of 3D imaging systems, which include laser scanners ...
Christoph Witzgall, Geraldine S. Cheok, Anthony J....
DSN
2006
IEEE
14 years 4 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh