Sciweavers

4307 search results - page 838 / 862
» Dynamic Spyware Analysis
Sort
View
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
14 years 1 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
14 years 1 months ago
What Does It Mean for an Organisation to Be Intelligent? Measuring Intellectual Bandwidth for Value Creation
The importance of electronic collaboration has risen as successful organisations recognize that they need to convert their intellectual resources into goods and services their cus...
Sajda Qureshi, Andries van der Vaart, Gijs Kauling...
ICRA
2002
IEEE
187views Robotics» more  ICRA 2002»
14 years 1 months ago
Trajectory Planning using Reachable-State Density Functions
:This paper presents a trajectory planning algorithm for mobile robots which may be subject to kinodynamic constraints. Using computational methods from noncommutative harmonic ana...
Richard Mason, Joel W. Burdick
IPPS
2002
IEEE
14 years 1 months ago
Performance Prediction Technology for Agent-Based Resource Management in Grid Environments
Resource management constitutes an important infrastructural component of a computational grid environment. The aim of grid resource management is to efficiently schedule applicat...
Junwei Cao, Stephen A. Jarvis, Daniel P. Spooner, ...
ISCC
2002
IEEE
135views Communications» more  ISCC 2002»
14 years 1 months ago
End-to-end versus explicit feedback measurement in 802.11 networks
Higher layer protocols in wireless networks need to dynamically adapt to observed network response. The common approach is that each session employs end-to-end monitoring to estim...
Manthos Kazantzidis, Mario Gerla