Sciweavers

1696 search results - page 280 / 340
» Knowledgeable development environments using shared design m...
Sort
View
PAMI
2006
106views more  PAMI 2006»
15 years 2 months ago
Statistical Analysis of Dynamic Actions
Real-world action recognition applications require the development of systems which are fast, can handle a large variety of actions without a priori knowledge of the type of actio...
Lihi Zelnik-Manor, Michal Irani
121
Voted
ASPDAC
2009
ACM
139views Hardware» more  ASPDAC 2009»
15 years 9 months ago
Hardware-dependent software synthesis for many-core embedded systems
Abstract— This paper presents synthesis of Hardware Dependent Software (HdS) for multicore and many-core designs using Embedded System Environment (ESE). ESE is a tool set, devel...
Samar Abdi, Gunar Schirner, Ines Viskic, Hansu Cho...
130
Voted
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
15 years 2 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus
159
Voted
WORDS
2005
IEEE
15 years 8 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
128
Voted
ETRICS
2006
15 years 6 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...