Sciweavers

1352 search results - page 218 / 271
» Designing Security Requirements Models Through Planning
Sort
View
JSW
2008
99views more  JSW 2008»
13 years 8 months ago
Using Data Mining in MURA Graphic Problems
The MURA phenomenon will result lots of problems in Photomask and TFT-LCD industries as well. In this paper, we designed and developed a MURA related association rules which suitab...
Wen-Hsing Kao, Jason C. Hung, Victoria Hsu
CP
2010
Springer
13 years 7 months ago
Context-Sensitive Call Control Using Constraints and Rules
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
RTSS
2009
IEEE
14 years 3 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
WWW
2004
ACM
14 years 9 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
14 years 3 months ago
Remote Low Frequency State Feedback Kinematic Motion Control for Mobile Robot Trajectory Tracking
— Teleoperated robots generally receive high level commands from a remote system, while accomplishing motion control through conventional means. We present a teleoperated system ...
Daniel Montrallo Flickinger, Mark A. Minor