Sciweavers

498 search results - page 83 / 100
» Constraint Answer Set Programming Systems
Sort
View
BMCBI
2008
152views more  BMCBI 2008»
13 years 7 months ago
Predicting biological system objectives de novo from internal state measurements
Background: Optimization theory has been applied to complex biological systems to interrogate network properties and develop and refine metabolic engineering strategies. For examp...
Erwin P. Gianchandani, Matthew A. Oberhardt, Antho...
SIGMETRICS
2003
ACM
129views Hardware» more  SIGMETRICS 2003»
14 years 27 days ago
Run-time modeling and estimation of operating system power consumption
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Tao Li, Lizy Kurian John
PERCOM
2007
ACM
14 years 7 months ago
The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario
Due to the inherent nature of their heterogeneity, resource scarcity and dynamism, the provision of middleware for future networked embedded environments is a challenging task. In...
Paolo Costa, Geoff Coulson, Richard Gold, Manish L...
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Goal based optimal selection of media streams
A multimedia system utilizes a set of correlated media streams each of which partially help in achieving the system goal. However, since not all of the streams always contribute t...
Pradeep K. Atrey, Mohan S. Kankanhalli
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 12 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok