Sciweavers

1283 search results - page 192 / 257
» Atomicity Implementation in Mobile Computing
Sort
View
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 10 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
PERVASIVE
2008
Springer
13 years 8 months ago
Rapid Prototyping of Activity Recognition Applications
The Context Recognition Network (CRN) Toolbox permits fast implementation of activity and context recognition systems. It utilizes parameterizable and reusable software components...
David Bannach, Oliver Amft, Paul Lukowicz
AROBOTS
2005
100views more  AROBOTS 2005»
13 years 8 months ago
A Sampling-Based Motion Planning Approach to Maintain Visibility of Unpredictable Targets
This paper deals with the surveillance problem of computing the motions of one or more robot observers in order to maintain visibility of one or several moving targets. The target...
Rafael Murrieta-Cid, Benjamín Tovar, Seth H...
PERCOM
2010
ACM
13 years 7 months ago
The ADAMO project: Architecture to support communication for emergency services
—When emergency services are in a crisis situation, one of their major needs is to have efficient communication. Every person involved needs to have the most up-to-date and rele...
Johan Bergs, Dries Naudts, Nik Van den Wijngaert, ...
ERSA
2009
147views Hardware» more  ERSA 2009»
13 years 6 months ago
Fault Avoidance in Medium-Grain Reconfigurable Hardware Architectures
Medium-grain reconfigurable hardware (MGRH) architectures represent a hybrid between the versatility of a field programmable gate array (FPGA) and the computational power of a cust...
Kylan Robinson, José G. Delgado-Frias