Sciweavers

3999 search results - page 81 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
132
Voted
EMSOFT
2006
Springer
15 years 6 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
146
Voted
RTAS
2010
IEEE
15 years 1 months ago
Physicalnet: A Generic Framework for Managing and Programming Across Pervasive Computing Networks
This paper describes the design and implementation of a pervasive computing framework, named Physicalnet. Essentially, Physicalnet is a generic paradigm for managing and programmi...
Pascal Vicaire, Zhiheng Xie, Enamul Hoque, John A....
111
Voted
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
15 years 8 months ago
A developmental model of neural computation using cartesian genetic programming
The brain has long been seen as a powerful analogy from which novel computational techniques could be devised. However, most artificial neural network approaches have ignored the...
Gul Muhammad Khan, Julian F. Miller, David M. Hall...
121
Voted
ICSAP
2009
15 years 10 days ago
Omnidirectional Surveillance System for Digital Home Security
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porc...
Wai Kit Wong, Joanne Tze Yen Liew, Chu Kiong Loo, ...
152
Voted
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 6 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...