Sciweavers

795 search results - page 136 / 159
» Using Failure Models for Controlling Data Availability in Wi...
Sort
View
SAC
2009
ACM
14 years 12 hour ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
13 years 9 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis
SSS
2010
Springer
139views Control Systems» more  SSS 2010»
13 years 5 months ago
Vulnerability Analysis of High Dimensional Complex Systems
Complex systems experience dramatic changes in behavior and can undergo transitions from functional to dysfunctional states. An unstable system is prone to dysfunctional collective...
Vedant Misra, Dion Harmon, Yaneer Bar-Yam
MOBISYS
2007
ACM
14 years 7 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
MOBISYS
2007
ACM
14 years 7 months ago
Algorithm to automatically detect abnormally long periods of inactivity in a home
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...