• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 15
Next 10 →

Disk Aware Discord Discovery: Finding Unusual Time Series in Terabyte Sized

by Dragomir Yankov Eamonn Keogh
"... The problem of finding unusual time series has recently attracted much attention, and several promising methods are now in the literature. However, virtually all proposed methods assume that the data reside in main memory. For many real-world problems this is not be the case. For example, in astrono ..."
Abstract - Cited by 20 (6 self) - Add to MetaCart
be discovered with a disk aware algorithm. The proposed algorithm is exact and requires only two linear scans of the disk with a tiny buffer of main memory. Furthermore, it is very simple to implement. We use the algorithm to provide further evidence of the effectiveness of the discord definition in areas

Finding Time Series Motifs in Disk-Resident Data

by Abdullah Mueen, Eamonn Keogh, Nima Bigdely-shamlo
"... Abstract—Time series motifs are sets of very similar subsequences of a long time series. They are of interest in their own right, and are also used as inputs in several higher-level data mining algorithms including classification, clustering, rule-discovery and summarization. In spite of extensive r ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
research in recent years, finding exact time series motifs in massive databases is an open problem. Previous efforts either found approximate motifs or considered relatively small datasets residing in main memory. In this work, we describe for the first time a disk-aware algorithm to find exact time series

Reliable Mobicast via Face-Aware Routing

by Qingfeng Huang, Chenyang Lu, Gruia-Catalin Roman - In Proceedings of IEEE Infocom ’04 , 2004
"... This paper presents a novel protocol for a spatiotemporal variant of multicast called mobicast, designed to support message delivery in ad hoc sensor networks. The spatiotemporal character of mobicast relates to the obligation to deliver a message to all the nodes that will be present at time t in s ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
t in some geographic zone Z, where both the location and shape of the delivery zone are a function of time over some interval (tstart , t end ). The protocol, called Face-Aware Routing (FAR), exploits ideas adapted from existing applications of face routing to achieve reliable mobicast delivery. The key

1 Reliable Mobicast via Face-Aware Routing

by Qingfeng Huang, Chenyang Lu, Gruia-catalin Roman
"... Abstract — This paper presents a novel protocol for a spatiotemporal variant of multicast called mobicast, designed to support message delivery in sensor and mobile ad hoc networks. The spatiotemporal character of mobicast relates to the obligation to deliver a message to all the nodes that will be ..."
Abstract - Add to MetaCart
that will be present at time t in some geographic zone Z, where both the location and shape of the delivery zone are a function of time over some interval (tstart, tend). The protocol, called Face-Aware Routing (FAR), exploits ideas adapted from existing applications of face routing to achieve reliable mobicast

Localization in Wireless Sensor Networks

by Mark Terwilliger , 2006
"... With the proliferation of wireless sensor networks, providing location-aware technology and services to new applications have become important for developers. Localization is the problem of determining the positions of nodes in an ad hoc network. With the constrained resources of network sensors, pr ..."
Abstract - Add to MetaCart
Strategies in Sensornets, provides substantial energy savings over existing techniques while providing comparable accuracy. We then introduce an efficient location discovery algorithm that bounds the localization error. Our algorithm, based on finding the smallest circle enclosing the intersection of n disks

Software reverse engineering as a sensemaking task (in press).

by A R Bryant , R F Mills , G L Peterson , M R Grimaila , Adam R Bryant , Robert F Mills , Gilbert L Peterson , Michael R Grimaila - Journal of Information Assurance and Security. , 2012
"... Abstract: Software reverse engineering involves analyzing computer program executables to understand their structure, functionality, and behavior. In this paper, common reverse engineering functions are decomposed to isolate the information-processing and sensemaking subtasks involved. This paper r ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
understanding, sensemaking, situation awareness, knowledge engineering I. Introduction Software reverse engineering is a type of complex task which at the surface involves many common features with the cognitive processes of sensemaking and situation awareness. In particular, reverse engineering an executable

By

by Richard Brian Adams , 2013
"... I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution. ..."
Abstract - Add to MetaCart
I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution.

Routing and Broadcasting in Ad-Hoc Networks

by Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Prof Dr, T. Braun, Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Von Frutigen, Prof Dr, T. Braun
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract - Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present the work on various conferences, for which I thank him. I would also like to thank Prof. Dr. Roger Wattenhofer, responsible for the Koreferat of this work. Also, Prof. Dr. Oscar Nierstrasz who was willing to be the co-examinator of this work deserves many thanks. Many thanks go to my colleagues of the RVS group and of the IAM for our various interesting discussions about all kinds of topics and for making the institute a very pleasant and friendly place to work at. Special thanks go to David Steiner, Marc Steinemann, Matthias Scheidegger, Florian Baumgartner, Ruy De Oliveira, and Attila Weyland. There are many students who worked with me and helped a lot in developing and implementing. Among them I especially thankful to Thomas Bernoulli,

New Techniques for Geographic Routing

by Ben Wing, Ben Wing, Lup Leong, Lup Leong , 2006
"... As wireless sensor networks continue to grow in size, we are faced with the prospect of emerging wireless networks with hundreds or thousands of nodes. Geographic routing algorithms are a promising alternative to tradition ad hoc routing algorithms in this new domain for point-to-point routing, but ..."
Abstract - Add to MetaCart
As wireless sensor networks continue to grow in size, we are faced with the prospect of emerging wireless networks with hundreds or thousands of nodes. Geographic routing algorithms are a promising alternative to tradition ad hoc routing algorithms in this new domain for point-to-point routing, but deployments of such algorithms are currently uncommon because of some practical difficulties.

Raj Jain! Routing vs Switching

by Raj Jain, Raj Jain Overview, Raj Jain, Label Stacks
"... 1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP ..."
Abstract - Add to MetaCart
1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP
Next 10 →
Results 1 - 10 of 15
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University