Sciweavers

995 search results - page 176 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
GLOBECOM
2007
IEEE
13 years 7 months ago
Cooperative Beamforming for Wireless Ad Hoc Networks
—Via collaborative beamforming, nodes in a wireless network are able to transmit a common message over long distances in an energy efficient fashion. However, the process of mak...
Lun Dong, Athina P. Petropulu, H. Vincent Poor
ICMLA
2009
13 years 5 months ago
Structured Prediction Models for Chord Transcription of Music Audio
Chord sequences are a compact and useful description of music, representing each beat or measure in terms of a likely distribution over individual notes without specifying the not...
Adrian Weller, Daniel P. W. Ellis, Tony Jebara
ICSE
2008
IEEE-ACM
14 years 7 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
EDOC
2007
IEEE
14 years 1 months ago
Publishing of Interoperable Services and Processes in UDDI
— This paper presents a requirements analysis and a solution approach to representing workflow processes conforming to the Wf-XML/ASAP standard proposal in a UDDI registry. Wf-X...
Marcus Spies, Harald Schöning, Keith Swenson
BTW
2007
Springer
185views Database» more  BTW 2007»
14 years 1 months ago
Data Staging for OLAP- and OLTP-Applications on RFID Data
: The emerging trend towards seamless monitoring of all business processes via comprehensive sensor networks – in particular RFID readers – creates new data management challeng...
Stefan Krompass, Stefan Aulbach, Alfons Kemper