Sciweavers

5790 search results - page 1063 / 1158
» Distributed programming with distributed authorization
Sort
View
TC
2002
13 years 8 months ago
The Timely Computing Base Model and Architecture
Abstract-- Current systems are very often based on largescale, unpredictable and unreliable infrastructures. However, users of these systems increasingly require services with time...
Paulo Veríssimo, Antonio Casimiro
TEC
2002
166views more  TEC 2002»
13 years 8 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 8 months ago
Electricity Demand and Energy Consumption Management System
This project describes the electricity demand and energy consumption management system and its application to Southern Peru smelter. It is composted of an hourly demand-forecastin...
Juan Ojeda Sarmiento
IJSNET
2008
138views more  IJSNET 2008»
13 years 8 months ago
Energy-efficient connected-coverage in wireless sensor networks
Abstract: This paper addresses the target coverage problem in wireless sensor networks. Communication and sensing consume energy, therefore efficient power management can extend ne...
Ionut Cardei, Mihaela Cardei
MVA
2007
158views Computer Vision» more  MVA 2007»
13 years 8 months ago
Hybrid object labelling in digital images
The application of a technique for labelling connected components based on the classical recursive technique is studied. The recursive approach permits labelling, counting, and cha...
Julio Martín-Herrero
« Prev « First page 1063 / 1158 Last » Next »