Sciweavers

283 search results - page 32 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
PKDD
2005
Springer
123views Data Mining» more  PKDD 2005»
14 years 1 months ago
A Multi-metric Index for Euclidean and Periodic Matching
In many classification and data-mining applications the user does not know a priori which distance measure is the most appropriate for the task at hand without examining the produ...
Michail Vlachos, Zografoula Vagena, Vittorio Caste...
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
14 years 1 months ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
KBSE
2007
IEEE
14 years 2 months ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
CIA
2007
Springer
14 years 1 months ago
From Local Search to Global Behavior: Ad Hoc Network Example
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
Osher Yadgar
ICSM
2005
IEEE
14 years 1 months ago
A Category-theoretic Approach to Syntactic Software Merging
Software merging is a common and essential activity during the lifespan of large-scale software systems. Traditional textual merge techniques are inadequate for detecting syntacti...
Nan Niu, Steve M. Easterbrook, Mehrdad Sabetzadeh