Sciweavers

3424 search results - page 97 / 685
» Building Diverse Computer Systems
Sort
View
FASE
2003
Springer
14 years 1 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
GRC
2008
IEEE
13 years 8 months ago
A Computational Model on Harmonizing Chinese Folksong with Piano Accompaniment
Research on auto-harmonizing a melody (e.g. Chinese folksong) with piano accompaniment is trying to build up a computer system which generates a 3voice music including piano left-...
Yin Feng, Chang-Le Zhou
INFOCOM
2006
IEEE
14 years 1 months ago
Light-Weight Overlay Path Selection in a Peer-to-Peer Environment
— Large-scale peer-to-peer systems span a wide range of Internet locations. Such diversity can be leveraged to build overlay “detours” to circumvent periods of poor performan...
Teng Fei, Shu Tao, Lixin Gao, Roch Guérin, ...
SECURWARE
2008
IEEE
14 years 2 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
ICVS
2003
Springer
14 years 1 months ago
Automatic Mapping of Settlement Areas Using a Knowledge-Based Image Interpretation System
Abstract. We introduce the knowledge-based image interpretation system GeoAIDA and give examples for an image operator, extracting trees from aerial imagery. Moreover we present a ...
Bernd-Michael Straub, Markus Gerke, Martin Pahl