Sciweavers

1266 search results - page 74 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
AINA
2008
IEEE
15 years 10 months ago
Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems
An experimental study shows the feasibility of service-oriented architectures for industrial automation and control systems even with respect to lower, real-time dependent control...
Andre Pohl, Heiko Krumm, Felix Holland, Franz-Jose...
ISER
2000
Springer
133views Robotics» more  ISER 2000»
15 years 7 months ago
Merging Gaussian Distributions for Object Localization in Multi-robot Systems
: We present a method for representing, communicating, and fusing distributed, noisy, and uncertain observations of an object by multiple robots. The approach relies on re-paramete...
Ashley W. Stroupe, Martin C. Martin, Tucker R. Bal...
SIGCOMM
2012
ACM
13 years 6 months ago
ShadowStream: performance evaluation as a capability in production internet live streaming networks
As live streaming networks grow in scale and complexity, they are becoming increasingly difficult to evaluate. Existing evaluation methods including lab/testbed testing, simulati...
Chen Tian, Richard Alimi, Yang Richard Yang, David...
KDD
1998
ACM
112views Data Mining» more  KDD 1998»
15 years 8 months ago
Evaluating Usefulness for Dynamic Classification
This paper develops the concept of usefulness in the context of supervised learning. We argue that usefulness can be used to improve the performance of classification rules (as me...
Gholamreza Nakhaeizadeh, Charles Taylor, Carsten L...
TMA
2010
Springer
487views Management» more  TMA 2010»
15 years 11 months ago
End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison
Abstract. The available bandwidth of a network path impacts the performance of many applications, such as VoIP calls, video streaming and P2P content distribution systems. Several ...
Emanuele Goldoni, Marco Schivi