Sciweavers

3481 search results - page 513 / 697
» Exploration in Relational Worlds
Sort
View
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 4 months ago
Using Software Component Models and Services in Embedded Real-Time Systems
While the use of software component models has become popular in the development of desktop applications and distributed information systems, such models have not been widely used...
Frank Lüders, Shoaib Ahmad, Faisal Khizer, Gu...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
ICRA
2007
IEEE
157views Robotics» more  ICRA 2007»
14 years 4 months ago
Learning to Select State Machines using Expert Advice on an Autonomous Robot
— Hierarchical state machines have proven to be a powerful tool for controlling autonomous robots due to their flexibility and modularity. For most real robot implementations, h...
Brenna Argall, Brett Browning, Manuela M. Veloso
IEEEPACT
2007
IEEE
14 years 4 months ago
Automatic Correction of Loop Transformations
Loop nest optimization is a combinatorial problem. Due to the growing complexity of modern architectures, it involves two increasingly difficult tasks: (1) analyzing the profita...
Nicolas Vasilache, Albert Cohen, Louis-Noël P...
IPPS
2007
IEEE
14 years 4 months ago
RAxML-Cell: Parallel Phylogenetic Tree Inference on the Cell Broadband Engine
Computational phylogeny is a challenging application even for the most powerful supercomputers. It is also an ideal candidate for benchmarking emerging multiprocessor architecture...
Filip Blagojevic, Alexandros Stamatakis, Christos ...