Sciweavers

1272 search results - page 175 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
152
Voted
CBSE
2010
Springer
15 years 9 months ago
A Three-Tier Approach for Composition of Real-Time Embedded Software Stacks
Abstract. Many component models and frameworks have been proabstract and capture concerns from Real-Time and Embedded application domains, based on high-level component-based appro...
Frédéric Loiret, Lionel Seinturier, ...
HICSS
1998
IEEE
120views Biometrics» more  HICSS 1998»
15 years 8 months ago
Load-Frequency Control Service in a Deregulated Environment
In a deregulated environment, independent generators and utility generators may or may not participate in the load-frequency control of the system. For the purpose of evaluating t...
A. P. Sakis Meliopoulos, George J. Cokkinides, A. ...
DCOSS
2008
Springer
15 years 6 months ago
Frugal Sensor Assignment
When a sensor network is deployed in the field it is typically required to support multiple simultaneous missions, which may start and finish at different times. Schemes that match...
Matthew P. Johnson, Hosam Rowaihy, Diego Pizzocaro...
INFOSCALE
2007
ACM
15 years 5 months ago
A distributed incremental nearest neighbor algorithm
Searching for non-text data (e.g., images) is mostly done by means of metadata annotations or by extracting the text close to the data. However, supporting real content-based audi...
Fabrizio Falchi, Claudio Gennaro, Fausto Rabitti, ...
IM
2007
15 years 5 months ago
Automated Availability Management Driven by Business Policies
—Policy-driven service management helps reduce IT management cost and it keeps the service management aligned with business objectives. While most of the previous research focuse...
Zhongtang Cai, Yuan Chen, Vibhore Kumar, Dejan S. ...