Sciweavers

5722 search results - page 1133 / 1145
» Security Function Interactions
Sort
View
CCR
2005
131views more  CCR 2005»
13 years 8 months ago
A clean slate 4D approach to network control and management
Today's data networks are surprisingly fragile and difficult to manage. We argue that the root of these problems lies in the complexity of the control and management planes--...
Albert G. Greenberg, Gísli Hjálmt&ya...
JSA
2007
191views more  JSA 2007»
13 years 8 months ago
Automated memory-aware application distribution for Multi-processor System-on-Chips
Mapping of applications on a Multiprocessor System-on-Chip (MP-SoC) is a crucial step to optimize performance, energy and memory constraints at the same time. The problem is formu...
Heikki Orsila, Tero Kangas, Erno Salminen, Timo D....
TVCG
2008
173views more  TVCG 2008»
13 years 8 months ago
Sinus Endoscopy - Application of Advanced GPU Volume Rendering for Virtual Endoscopy
For difficult cases in endoscopic sinus surgery, a careful planning of the intervention is necessary. Due to the reduced field of view during the intervention, the surgeons have le...
Arno Krüger, Christoph Kubisch, Gero Strau&sz...
AIM
2002
13 years 8 months ago
Electric Elves: Agent Technology for Supporting Human Organizations
The operation of a human organization requires dozens of everyday tasks to ensure coherence in organizational activities, to monitor the status of such activities, to gather infor...
Hans Chalupsky, Yolanda Gil, Craig A. Knoblock, Kr...
BC
2002
193views more  BC 2002»
13 years 8 months ago
Resonant spatiotemporal learning in large random recurrent networks
Taking a global analogy with the structure of perceptual biological systems, we present a system composed of two layers of real-valued sigmoidal neurons. The primary layer receives...
Emmanuel Daucé, Mathias Quoy, Bernard Doyon
« Prev « First page 1133 / 1145 Last » Next »