Sciweavers

992 search results - page 179 / 199
» Dependencies to Optimize Ontology Based Data Access
Sort
View
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
13 years 11 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
WSCG
2003
167views more  WSCG 2003»
13 years 9 months ago
Vector-valued Image Restoration with Applications to Magnetic Resonance Velocity Imaging
The analysis of blood flow patterns and the interaction between salient topological flow features and cardiovascular structure plays an important role in the study of cardiovascul...
Yin-Heung Pauline Ng, Guang-Zhong Yang
FITRAMEN
2008
13 years 9 months ago
High-Performance H.264/SVC Video Communications in 802.11e Ad Hoc Networks
This work focuses on improving the performance of video communications based on the recently developed H.264 Scalable Video Coding (SVC) standard over 802.11e wireless networks. Th...
Attilio Fiandrotti, Dario Gallucci, Enrico Masala,...
NSDI
2004
13 years 9 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...