Results 1 - 10
of
15
Disk Aware Discord Discovery: Finding Unusual Time Series in Terabyte Sized
"... The problem of finding unusual time series has recently attracted much attention, and several promising methods are now in the literature. However, virtually all proposed methods assume that the data reside in main memory. For many real-world problems this is not be the case. For example, in astrono ..."
Abstract
-
Cited by 20 (6 self)
- Add to MetaCart
be discovered with a disk aware algorithm. The proposed algorithm is exact and requires only two linear scans of the disk with a tiny buffer of main memory. Furthermore, it is very simple to implement. We use the algorithm to provide further evidence of the effectiveness of the discord definition in areas
Finding Time Series Motifs in Disk-Resident Data
"... Abstract—Time series motifs are sets of very similar subsequences of a long time series. They are of interest in their own right, and are also used as inputs in several higher-level data mining algorithms including classification, clustering, rule-discovery and summarization. In spite of extensive r ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
research in recent years, finding exact time series motifs in massive databases is an open problem. Previous efforts either found approximate motifs or considered relatively small datasets residing in main memory. In this work, we describe for the first time a disk-aware algorithm to find exact time series
Reliable Mobicast via Face-Aware Routing
- In Proceedings of IEEE Infocom ’04
, 2004
"... This paper presents a novel protocol for a spatiotemporal variant of multicast called mobicast, designed to support message delivery in ad hoc sensor networks. The spatiotemporal character of mobicast relates to the obligation to deliver a message to all the nodes that will be present at time t in s ..."
Abstract
-
Cited by 16 (0 self)
- Add to MetaCart
t in some geographic zone Z, where both the location and shape of the delivery zone are a function of time over some interval (tstart , t end ). The protocol, called Face-Aware Routing (FAR), exploits ideas adapted from existing applications of face routing to achieve reliable mobicast delivery. The key
1 Reliable Mobicast via Face-Aware Routing
"... Abstract — This paper presents a novel protocol for a spatiotemporal variant of multicast called mobicast, designed to support message delivery in sensor and mobile ad hoc networks. The spatiotemporal character of mobicast relates to the obligation to deliver a message to all the nodes that will be ..."
Abstract
- Add to MetaCart
that will be present at time t in some geographic zone Z, where both the location and shape of the delivery zone are a function of time over some interval (tstart, tend). The protocol, called Face-Aware Routing (FAR), exploits ideas adapted from existing applications of face routing to achieve reliable mobicast
Localization in Wireless Sensor Networks
, 2006
"... With the proliferation of wireless sensor networks, providing location-aware technology and services to new applications have become important for developers. Localization is the problem of determining the positions of nodes in an ad hoc network. With the constrained resources of network sensors, pr ..."
Abstract
- Add to MetaCart
Strategies in Sensornets, provides substantial energy savings over existing techniques while providing comparable accuracy. We then introduce an efficient location discovery algorithm that bounds the localization error. Our algorithm, based on finding the smallest circle enclosing the intersection of n disks
Software reverse engineering as a sensemaking task (in press).
- Journal of Information Assurance and Security.
, 2012
"... Abstract: Software reverse engineering involves analyzing computer program executables to understand their structure, functionality, and behavior. In this paper, common reverse engineering functions are decomposed to isolate the information-processing and sensemaking subtasks involved. This paper r ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
understanding, sensemaking, situation awareness, knowledge engineering I. Introduction Software reverse engineering is a type of complex task which at the surface involves many common features with the cognitive processes of sensemaking and situation awareness. In particular, reverse engineering an executable
By
, 2013
"... I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution. ..."
Abstract
- Add to MetaCart
I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution.
Routing and Broadcasting in Ad-Hoc Networks
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract
- Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present the work on various conferences, for which I thank him. I would also like to thank Prof. Dr. Roger Wattenhofer, responsible for the Koreferat of this work. Also, Prof. Dr. Oscar Nierstrasz who was willing to be the co-examinator of this work deserves many thanks. Many thanks go to my colleagues of the RVS group and of the IAM for our various interesting discussions about all kinds of topics and for making the institute a very pleasant and friendly place to work at. Special thanks go to David Steiner, Marc Steinemann, Matthias Scheidegger, Florian Baumgartner, Ruy De Oliveira, and Attila Weyland. There are many students who worked with me and helped a lot in developing and implementing. Among them I especially thankful to Thomas Bernoulli,
New Techniques for Geographic Routing
, 2006
"... As wireless sensor networks continue to grow in size, we are faced with the prospect of emerging wireless networks with hundreds or thousands of nodes. Geographic routing algorithms are a promising alternative to tradition ad hoc routing algorithms in this new domain for point-to-point routing, but ..."
Abstract
- Add to MetaCart
As wireless sensor networks continue to grow in size, we are faced with the prospect of emerging wireless networks with hundreds or thousands of nodes. Geographic routing algorithms are a promising alternative to tradition ad hoc routing algorithms in this new domain for point-to-point routing, but deployments of such algorithms are currently uncommon because of some practical difficulties.
Raj Jain! Routing vs Switching
"... 1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP ..."
Abstract
- Add to MetaCart
1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP
Results 1 - 10
of
15