Sciweavers

467 search results - page 75 / 94
» Simple Mechanical Control Systems with Constraints and Symme...
Sort
View
SASO
2007
IEEE
14 years 1 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
ICETE
2004
204views Business» more  ICETE 2004»
13 years 9 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
ATAL
2003
Springer
14 years 28 days ago
Coalition formation with uncertain heterogeneous information
Coalition formation methods allow agents to join together and are thus necessary in cases where tasks can only be performed cooperatively by groups. This is the case in the Reques...
Sarit Kraus, Onn Shehory, Gilad Taase
DAGSTUHL
2006
13 years 9 months ago
Cognitive Vision Needs Attention to Link Sensing with Recognition
Abstract. "Cognitive computer vision is concerned with integration and control of vision systems using explicit but not necessarily symbolic models of context, situation and g...
John K. Tsotsos
KES
2004
Springer
14 years 1 months ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka