Sciweavers

288 search results - page 47 / 58
» A new approach to real-time checkpointing
Sort
View
ATAL
2011
Springer
12 years 7 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
KDD
2003
ACM
192views Data Mining» more  KDD 2003»
14 years 7 months ago
Efficient elastic burst detection in data streams
Burst detection is the activity of finding abnormal aggregates in data streams. Such aggregates are based on sliding windows over data streams. In some applications, we want to mo...
Yunyue Zhu, Dennis Shasha
DATE
2009
IEEE
139views Hardware» more  DATE 2009»
14 years 2 months ago
Reliable mode changes in real-time systems with fixed priority or EDF scheduling
Abstract—Many application domains require adaptive realtime embedded systems that can change their functionality over time. In such systems it is not only necessary to guarantee ...
Nikolay Stoimenov, Simon Perathoner, Lothar Thiele
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 1 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
FUZZIEEE
2007
IEEE
14 years 1 months ago
Soft Target Based Obstacle Avoidance for Car-like Mobile Robot in Dynamic Environment
— The real time flexible operation of a car-like mobile robot with nonholonomic constraints in dynamic environment is still a very challenging problem. The difficulty lies in t...
Yougen Chen, Seiji Yasunobu