Sciweavers

1053 search results - page 44 / 211
» On k-Path Covers and their applications
Sort
View
CIDR
2007
106views Algorithms» more  CIDR 2007»
13 years 10 months ago
Isolation Support for Service-based Applications: A Position Paper
In this paper, we propose an approach that provides the benefits of isolation in service-oriented applications where it is not feasible to use the traditional locking mechanisms u...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...
HCI
2007
13 years 10 months ago
On Some Aspects of Improving Mobile Applications for the Elderly
Improving the quality of life of elderly people is an emerging issue within our information society for both research and development. This paper addresses some issues on the devel...
Andreas Holzinger, Gig Searle, Alexander K. Nische...
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
14 years 3 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
ISCAS
2005
IEEE
128views Hardware» more  ISCAS 2005»
14 years 2 months ago
A low-power CMOS power amplifier for ultra wideband (UWB) applications
Abstract— This paper presents the design and implementation of a wideband power amplifier for UWB applications, covering the lower band frequencies of 3.1 GHz to 4.8 GHz. To achi...
Sajay Jose, Hyung-Jin Lee, Dong Sam Ha, Sangsung C...
SEKE
2005
Springer
14 years 2 months ago
Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis
Design combinatorial theory for test-case generation has been used successfully in the past. It is useful in optimizing test cases as it is practically impossible to exhaustively t...
Chung-Horng Lung, Marzia Zaman