Sciweavers

1735 search results - page 324 / 347
» Using UML for Business Object Based Systems Modeling
Sort
View
PRDC
2009
IEEE
14 years 2 months ago
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT
—With ever-growing complexity of computer and communication systems analytical methods do not scale, especially with respect to dependability assessment of information technology...
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Mal...
ADAEUROPE
2005
Springer
14 years 1 months ago
Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks
: In previous papers we had presented an application program interface (API) that enabled applications to use application-defined scheduling algorithms for Ada tasks in a way compa...
Mario Aldea Rivas, Javier Miranda, Michael Gonz&aa...
CVPR
2010
IEEE
14 years 4 months ago
Probabilistic 3D Occupancy Flow with Latent Silhouette Cues
In this paper we investigate shape and motion retrieval in the context of multi-camera systems. We propose a new lowlevel analysis based on latent silhouette cues, particularly su...
Li Guan, Jean-Sebastien Franco, Edmond Boyer, Marc...
ICDCS
2010
IEEE
13 years 9 months ago
Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring
Continuously monitoring the link performance is important to network diagnosis. Recently, active probes sent between end systems are widely used to monitor the link performance. I...
Qiang Zheng, Guohong Cao
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
13 years 8 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...