Sciweavers

1352 search results - page 218 / 271
» Designing Security Requirements Models Through Planning
Sort
View
JSW
2008
99views more  JSW 2008»
15 years 3 months ago
Using Data Mining in MURA Graphic Problems
The MURA phenomenon will result lots of problems in Photomask and TFT-LCD industries as well. In this paper, we designed and developed a MURA related association rules which suitab...
Wen-Hsing Kao, Jason C. Hung, Victoria Hsu
111
Voted
CP
2010
Springer
15 years 2 months ago
Context-Sensitive Call Control Using Constraints and Rules
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
144
Voted
RTSS
2009
IEEE
15 years 10 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
137
Voted
WWW
2004
ACM
16 years 4 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
133
Voted
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
15 years 10 months ago
Remote Low Frequency State Feedback Kinematic Motion Control for Mobile Robot Trajectory Tracking
— Teleoperated robots generally receive high level commands from a remote system, while accomplishing motion control through conventional means. We present a teleoperated system ...
Daniel Montrallo Flickinger, Mark A. Minor