Sciweavers

1831 search results - page 282 / 367
» Time Constraints in Workflow Systems
Sort
View
JCS
2002
115views more  JCS 2002»
13 years 10 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
CDC
2010
IEEE
185views Control Systems» more  CDC 2010»
13 years 6 months ago
Distributed perimeter patrolling and tracking for camera networks
In this work, we propose a distributed control strategy for perimeter patrolling and target tracking in a multi-camera videosurveillance system with communication, resources and sp...
Mauro Baseggio, Angelo Cenedese, Pierangelo Merlo,...
PDPTA
2004
14 years 16 days ago
Efficient Disk Replacement and Data Migration Algorithms for Large Disk Subsystems
Random data placement has recently emerged as an alternative to traditional data striping. From a performance perspective, it has been demonstrated to be an efficient and scalable...
Roger Zimmermann, Beomjoo Seo
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
14 years 3 months ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli
LCTRTS
2010
Springer
14 years 6 months ago
Sampling-based program execution monitoring
For its high overall cost during product development, program debugging is an important aspect of system development. Debugging is a hard and complex activity, especially in time-...
Sebastian Fischmeister, Yanmeng Ba