Sciweavers

2078 search results - page 408 / 416
» Using Aspects to Make Adaptive Object-Models Adaptable
Sort
View
WS
2005
ACM
14 years 1 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
GECCO
2005
Springer
171views Optimization» more  GECCO 2005»
14 years 1 months ago
Behaviorally coupled emergent representation
Traditionally, representation has been perceived as a necessity for producing intelligent behavior. Once the right representation is in place to drive it, behavior unfolds as the ...
Joseph Lewis, Jamie Lawson
VLDB
2005
ACM
140views Database» more  VLDB 2005»
14 years 1 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu
MDM
2004
Springer
14 years 28 days ago
Processing Range-Monitoring Queries on Heterogeneous Mobile Objects
We consider in this paper how to leverage heterogeneous mobile computing capability for efficient processing of real-time range-monitoring queries. In our environment, each mobil...
Ying Cai, Kien A. Hua, Guohong Cao
RAID
2004
Springer
14 years 27 days ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem