Sciweavers

1352 search results - page 165 / 271
» Designing Security Requirements Models Through Planning
Sort
View
IPCO
2004
110views Optimization» more  IPCO 2004»
13 years 11 months ago
Scheduling an Industrial Production Facility
Managing an industrial production facility requires carefully allocating limited resources, and gives rise to large, potentially complicated scheduling problems. In this paper we c...
Eyjolfur Asgeirsson, Jonathan W. Berry, Cynthia A....
DAC
2005
ACM
14 years 11 months ago
Trace-driven HW/SW cosimulation using virtual synchronization technique
Poor performance of HW/SW cosimulation is mainly caused by synchronization requirement between component simulators. Virtual synchronization technique was proposed to remove the n...
Dohyung Kim, Youngmin Yi, Soonhoi Ha
ALGOSENSORS
2009
Springer
14 years 4 months ago
Compressing Kinetic Data from Sensor Networks
We introduce a framework for storing and processing kinetic data observed by sensor networks. These sensor networks generate vast quantities of data, which motivates a significant...
Sorelle A. Friedler, David M. Mount
ECAL
2007
Springer
14 years 4 months ago
Neuroevolution of Agents Capable of Reactive and Deliberative Behaviours in Novel and Dynamic Environments
Both reactive and deliberative qualities are essential for a good action selection mechanism. We present a model that embodies a hybrid of two very different neural network archit...
Edward Robinson, Timothy Ellis, Alastair Channon
CODASPY
2012
12 years 5 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...