Sciweavers

851 search results - page 163 / 171
» Synthesis of Distributed Systems from Knowledge-Based Specif...
Sort
View
134
Voted
SENSYS
2006
ACM
15 years 8 months ago
Data compression algorithms for energy-constrained devices in delay tolerant networks
Sensor networks are fundamentally constrained by the difficulty and energy expense of delivering information from sensors to sink. Our work has focused on garnering additional si...
Christopher M. Sadler, Margaret Martonosi
141
Voted
AFRIGRAPH
2001
ACM
15 years 6 months ago
Expressive textures
If a moving image is more expressive than words or than a still image, then an animated facial expression can explain more in depth the feelings of a virtual character. Facial ani...
K. Fei
137
Voted
TMA
2010
Springer
150views Management» more  TMA 2010»
15 years 14 days ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
CIKM
2008
Springer
15 years 4 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
142
Voted
EMSOFT
2008
Springer
15 years 4 months ago
Randomized directed testing (REDIRECT) for Simulink/Stateflow models
The Simulink/Stateflow (SL/SF) environment from Mathworks is becoming the de facto standard in industry for model based development of embedded control systems. Many commercial to...
Manoranjan Satpathy, Anand Yeolekar, S. Ramesh