Sciweavers

2990 search results - page 101 / 598
» Thresholding for Change Detection
Sort
View
144
Voted
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
15 years 10 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 9 months ago
On the Limitations of Random Sensor Placement for Distributed Signal Detection
— We consider the design of a sensor network for detecting an emitter who if present is known to be located in an interval but whose exact position is unknown. We seek to minimiz...
Zhenyu Tu, Rick S. Blum
108
Voted
CHI
2009
ACM
16 years 4 months ago
Coralog: use-aware visualization connecting human micro-activities to environmental change
This paper describes the goal, design approach and specification, and preliminary use test of a use-aware ambient media called Coralog. Coralog is a widget which detects the durat...
Tanyoung Kim, Hwajung Hong, Brian Magerko
HAPTICS
2008
IEEE
15 years 10 months ago
Proposal of the Stretch Detection Hypothesis of the Meissner Corpuscle
Abstract. In order to realize artificial tactile sensation, we are researching the natural nerve activity timing of mechanoreceptors. Considering the energy conversion system of t...
Shinobu Kuroki, Hiroyuki Kajimoto, Hideaki Nii, Na...
113
Voted
RAID
2000
Springer
15 years 7 months ago
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
Joachim Biskup, Ulrich Flegel