Sciweavers

3641 search results - page 615 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
MICAI
2000
Springer
13 years 11 months ago
A Neurocontrol Scheme of a 2-DOF Manipulator Using CMAC
Artificial Neural Networks (ANN) are an emerging technology, yet, in continuous dynamic behavior, much work has been done to attempt to generate a formal method to design a contro...
Raúl Leal Ascencio, Marco A. Pérez C...
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 8 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
ICDCS
2007
IEEE
14 years 2 months ago
STEP: Sequentiality and Thrashing Detection Based Prefetching to Improve Performance of Networked Storage Servers
State-of-the-art networked storage servers are equipped with increasingly powerful computing capability and large DRAM memory as storage caches. However, their contribution to the...
Shuang Liang, Song Jiang, Xiaodong Zhang
GIS
2010
ACM
13 years 6 months ago
Using location based social networks for quality-aware participatory data transfer
The sensing systems that monitor physical environments rely on communication infrastructures (wired or wireless) to collect data from the sensors embedded in the environment. Howe...
Houtan Shirani-Mehr, Farnoush Banaei Kashani, Cyru...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 12 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...