Sciweavers

1441 search results - page 213 / 289
» A Practical Approach to Network-Based Processing
Sort
View
ICSE
2009
IEEE-ACM
14 years 5 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 5 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...
IPPS
2009
IEEE
14 years 5 months ago
Building a parallel pipelined external memory algorithm library
Large and fast hard disks for little money have enabled the processing of huge amounts of data on a single machine. For this purpose, the well-established STXXL library provides a...
Andreas Beckmann, Roman Dementiev, Johannes Single...
IROS
2009
IEEE
304views Robotics» more  IROS 2009»
14 years 5 months ago
Real time tracking using an active pan-tilt-zoom network camera
— We present here a real time active vision system on a PTZ network camera to track an object of interest. We address two critical issues in this paper. One is the control of the...
Thang Ba Dinh, Qian Yu, Gérard G. Medioni
ISORC
2009
IEEE
14 years 5 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega