Sciweavers

586 search results - page 85 / 118
» Network invariants for real-time systems
Sort
View
NIPS
2001
13 years 9 months ago
Improvisation and Learning
This article presents a 2-phase computational learning model and application. As a demonstration, a system has been built, called CHIME for Computer Human Interacting Musical Enti...
Judy A. Franklin
AINA
2008
IEEE
14 years 2 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
NETWORK
2006
186views more  NETWORK 2006»
13 years 8 months ago
Multiuser cross-layer resource allocation for video transmission over wireless networks
With the advancement of video-compression technology and the wide deployment of wireless networks, there is an increasing demand for wireless video communication services, and man...
Guan-Ming Su, Zhu Han, Min Wu, K. J. Ray Liu
ICRA
2003
IEEE
147views Robotics» more  ICRA 2003»
14 years 1 months ago
Modular petri net based modeling, analysis and synthesis of dedicated production systems
−−−− Ordinary t-timed Petri Nets are used for modeling, analysis and synthesis of random topology production systems and networks. Each production system is first decompose...
George J. Tsinarakis, Kimon P. Valavanis, Nikos Ts...
ACSAC
1999
IEEE
14 years 9 days ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti