Sciweavers

891 search results - page 151 / 179
» Temporal Constraints: A Survey
Sort
View
INFOCOM
2003
IEEE
14 years 4 months ago
Optimal replacement policies for non-uniform cache objects with optional eviction
Abstract— Replacement policies for general caching applications and Web caching in particular have been discussed extensively in the literature. Many ad-hoc policies have been pr...
Omri Bahat, Armand M. Makowski
CCS
2003
ACM
14 years 4 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
CP
2003
Springer
14 years 4 months ago
CP-IP Techniques for the Bid Evaluation in Combinatorial Auctions
Abstract. Combinatorial auctions are an important e-commerce application where bidders can bid on combinations of items. The problem of selecting the best bids that cover all items...
Alessio Guerri, Michela Milano
ICCSA
2003
Springer
14 years 4 months ago
Rate Control for Low Bit Rate Video via Enhanced Frame Skipping
A scene-adaptive rate control algorithm with an enhanced frame skipping is proposed for low bit rate video coding. Most existing rate control algorithms for low bit rate video focu...
Jae-Young Pyun, Yoon Kim, Sung-Jea Ko
ICRA
2002
IEEE
108views Robotics» more  ICRA 2002»
14 years 3 months ago
An Execution Control System for Autonomous Robots
Abstract— This paper presents some recent developments of the LAAS architecture for autonomous mobile robots. In particular, we specify the role of the Execution Control level of...
François Felix Ingrand, Frederic Py