Sciweavers

2645 search results - page 62 / 529
» Autonomous security for autonomous systems
Sort
View
ICOIN
2007
Springer
15 years 9 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
BPM
2008
Springer
132views Business» more  BPM 2008»
15 years 5 months ago
On Modeling and Maximizing Business Value for Autonomic Service-Oriented Systems
Abstract. The existing Web service management solutions are almost exclusively focused on optimization of technical QoS metrics (e.g., availability). However, financial (e.g., prof...
Vladimir Tosic
120
Voted
IROS
2006
IEEE
128views Robotics» more  IROS 2006»
15 years 9 months ago
A Laserscanner-Vision Fusion System Implemented on the TerraMax Autonomous Vehicle
— This paper presents a sensor fusion model developed for the 2005 Grand Challenge competition, an autonomous ground vehicle race across the Mojave desert organized by DARPA1 . T...
Alberto Broggi, Stefano Cattani, Pier Paolo Porta,...
136
Voted
DAC
2010
ACM
15 years 3 months ago
Adaptive and autonomous thermal tracking for high performance computing systems
Many DTM schemes rely heavily on the accurate knowledge of the chip's dynamic thermal state to make optimal performance/ temperature trade-off decisions. This information is ...
Yufu Zhang, Ankur Srivastava
137
Voted
ATAL
2007
Springer
15 years 9 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...