Sciweavers

1631 search results - page 208 / 327
» Extreme Programming - Back to Basics
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
13 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
PPSC
1993
13 years 11 months ago
A Matrix Framework for Conjugate Gradient Methods and Some Variants of CG with Less Synchronization Overhead
We will present a matrix framework for the conjugate gradient methods, which is expressed in terms of whole vector sequences instead of single vectors or initial parts of sequence...
Eduardo F. D'Azevedo, Victor Eijkhout, Charles H. ...
MOBICOM
2010
ACM
13 years 10 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
CDC
2008
IEEE
125views Control Systems» more  CDC 2008»
13 years 10 months ago
Efficient waypoint tracking hybrid controllers for double integrators using classical time optimal control
This paper is a response to requests from several respected colleagues in academia for a careful writeup of the classical time-optimal control based hybrid controllers that we have...
Haitham A. Hindi, Lara S. Crawford, Rong Zhou, Cra...
BMCBI
2010
160views more  BMCBI 2010»
13 years 10 months ago
Extracting consistent knowledge from highly inconsistent cancer gene data sources
Background: Hundreds of genes that are causally implicated in oncogenesis have been found and collected in various databases. For efficient application of these abundant but diver...
Xue Gong, Ruihong Wu, Yuannv Zhang, Wenyuan Zhao, ...