Sciweavers

796 search results - page 100 / 160
» Spoofing prevention method
Sort
View
RTAS
2009
IEEE
14 years 4 months ago
On Time-Aware Instrumentation of Programs
—Software instrumentation is a key technique in many stages of the development process. It is of particular importance for debugging embedded systems. Instrumented programs produ...
Sebastian Fischmeister, Patrick Lam
ICCBR
2009
Springer
14 years 4 months ago
Case-Based Collective Inference for Maritime Object Classification
Maritime assets such as merchant and navy ships, ports, and harbors, are targets of terrorist attacks as evidenced by the USS Cole bombing. Conventional methods of securing maritim...
Kalyan Moy Gupta, David W. Aha, Philip Moore
KI
2009
Springer
14 years 4 months ago
Constraint-Based Integration of Plan Tracking and Prognosis for Autonomous Production
Today’s complex production systems allow to simultaneously build different products following individual production plans. Such plans may fail due to component faults or unfores...
Paul Maier, Martin Sachenbacher, Thomas Rühr,...
KIVS
2009
Springer
14 years 4 months ago
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems
Abstract. In peer-to-peer based live streaming systems, a great number of participants have to cooperate to efficiently and reliably distribute a continuous flow of data. Each rec...
Michael Brinkmeier, Mathias Fischer, Sascha Grau, ...
LION
2009
Springer
203views Optimization» more  LION 2009»
14 years 4 months ago
Position-Guided Tabu Search Algorithm for the Graph Coloring Problem
A very undesirable behavior of any heuristic algorithm is to be stuck in some specific parts of the search space, in particular in the basins of attraction of the local optima. Wh...
Daniel Cosmin Porumbel, Jin-Kao Hao, Pascale Kuntz