Sciweavers

1092 search results - page 152 / 219
» Do summaries help
Sort
View
JTRES
2010
ACM
15 years 4 months ago
WCET driven design space exploration of an object cache
In order to guarantee that real-time systems meet their timing specification, static execution time bounds need to be calculated. Not considering execution time predictability led...
Benedikt Huber, Wolfgang Puffitsch, Martin Schoebe...
LDTA
2010
15 years 4 months ago
Faster ambiguity detection by grammar filtering
Real programming languages are often defined using ambiguous context-free grammars. Some ambiguity is intentional while other ambiguity is accidental. A good grammar development e...
H. J. S. Basten, Jurgen J. Vinju
MOBICOM
2010
ACM
15 years 4 months ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 4 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
69views Education» more  CORR 2010»
15 years 4 months ago
Efficient Knowledge Base Management in DCSP
DCSP (Distributed Constraint Satisfaction Problem) has been a very important research area in AI (Artificial Intelligence). There are many application problems in distributed AI t...
Hong Jiang