Sciweavers

2990 search results - page 101 / 598
» Thresholding for Change Detection
Sort
View
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
14 years 3 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 3 months ago
On the Limitations of Random Sensor Placement for Distributed Signal Detection
— We consider the design of a sensor network for detecting an emitter who if present is known to be located in an interval but whose exact position is unknown. We seek to minimiz...
Zhenyu Tu, Rick S. Blum
CHI
2009
ACM
14 years 9 months ago
Coralog: use-aware visualization connecting human micro-activities to environmental change
This paper describes the goal, design approach and specification, and preliminary use test of a use-aware ambient media called Coralog. Coralog is a widget which detects the durat...
Tanyoung Kim, Hwajung Hong, Brian Magerko
HAPTICS
2008
IEEE
14 years 3 months ago
Proposal of the Stretch Detection Hypothesis of the Meissner Corpuscle
Abstract. In order to realize artificial tactile sensation, we are researching the natural nerve activity timing of mechanoreceptors. Considering the energy conversion system of t...
Shinobu Kuroki, Hiroyuki Kajimoto, Hideaki Nii, Na...
RAID
2000
Springer
14 years 12 days ago
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
Joachim Biskup, Ulrich Flegel