enter search term and/or author name below:
Discrete wavelet transform-based time series analysis and mining
Pimwadee Chaovalit, Aryya Gangopadhyay, George Karabatis, Zhiyuan Chen
Article No.: 6
Time series are recorded values of an interesting phenomenon such as stock prices, household incomes, or patient heart rates over a period of time. Time series data mining focuses on discovering interesting patterns in such data. This article...
One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches
Aline Carneiro Viana, Stephane Maag, Fatiha Zaidi
Article No.: 7
Wireless self-organizing networks (WSONs) have attracted considerable attention from the network research community; however, the key for their success is the rigorous validation of the properties of the network protocols. Applications of risk or...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security...
A failure detector is a fundamental abstraction in distributed computing. This article surveys this abstraction through two dimensions. First we study failure detectors as building blocks to simplify the design of reliable distributed...
Auctions and bidding: A guide for computer scientists
Simon Parsons, Juan A. Rodriguez-Aguilar, Mark Klein
Article No.: 10
There is a veritable menagerie of auctions—single-dimensional, multi-dimensional, single-sided, double-sided, first-price, second-price, English, Dutch, Japanese, sealed-bid—and these have been extensively discussed and analyzed in the...
Combinatorial Testing (CT) can detect failures triggered by interactions of parameters in the Software Under Test (SUT) with a covering array test suite generated by some sampling mechanisms. It has been an active field of research in the last...
A review of grid authentication and authorization technologies and support for federated access control
Wei Jie, Junaid Arshad, Richard Sinnott, Paul Townend, Zhou Lei
Article No.: 12
Grid computing facilitates resource sharing typically to support distributed virtual organizations (VO). The multi-institutional nature of a grid environment introduces challenging security issues, especially with regard to authentication and...