Sciweavers

283 search results - page 7 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
ACL
2012
11 years 10 months ago
A Computational Approach to the Automation of Creative Naming
In this paper, we propose a computational approach to generate neologisms consisting of homophonic puns and metaphors based on the category of the service to be named and the prop...
Gözde Özbal, Carlo Strapparava
QEST
2009
IEEE
14 years 2 months ago
Exploiting Restricted Transitions in Quasi-Birth-and-Death Processes
—In this paper we consider Quasi-Birth-and-Death (QBD) processes where the upward (resp. downward) transitions are restricted to occur only from (resp. to) a subset of the phase ...
Juan F. Pérez, Benny Van Houdt
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
14 years 2 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
IJCAI
2007
13 years 9 months ago
Exploiting Independence in a Decentralised and Incremental Approach of Diagnosis
It is now well-known that the size of the model is the bottleneck when using model-based approaches to diagnose complex systems. To answer this problem, decentralized/distributed ...
Marie-Odile Cordier, Alban Grastien
CCGRID
2005
IEEE
14 years 1 months ago
Cluster security with NVisionCC: process monitoring by leveraging emergent properties
We have observed that supercomputing clusters made up of commodity off-the-shelf computers possess emergent properties that are apparent when these systems are considered as an in...
Gregory A. Koenig, Xin Meng, Adam J. Lee, Michael ...