Sciweavers

13043 search results - page 2363 / 2609
» Simulation of the research process
Sort
View
DGO
2008
112views Education» more  DGO 2008»
15 years 5 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
EMSOFT
2008
Springer
15 years 5 months ago
On the interplay of dynamic voltage scaling and dynamic power management in real-time embedded applications
Dynamic Voltage Scaling (DVS) and Dynamic Power Management (DPM) are two popular techniques commonly employed to save energy in real-time embedded systems. DVS policies aim at red...
Vinay Devadas, Hakan Aydin
GECCO
2008
Springer
239views Optimization» more  GECCO 2008»
15 years 5 months ago
Multiobjective design of operators that detect points of interest in images
In this paper, a multiobjective (MO) learning approach to image feature extraction is described, where Pareto-optimal interest point (IP) detectors are synthesized using genetic p...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...
RECSYS
2010
ACM
15 years 4 months ago
Eye-tracking product recommenders' usage
Recommender systems have emerged as an effective decision tool to help users more easily and quickly find products that they prefer, especially in e-commerce environments. However...
Sylvain Castagnos, Nicolas Jones, Pearl Pu
CCS
2010
ACM
15 years 4 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
« Prev « First page 2363 / 2609 Last » Next »