Sciweavers

1527 search results - page 305 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
JUCS
2008
112views more  JUCS 2008»
13 years 5 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
IJHPCA
2007
114views more  IJHPCA 2007»
13 years 5 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
CN
2004
256views more  CN 2004»
13 years 5 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
JUCS
2010
147views more  JUCS 2010»
13 years 4 months ago
Ambient Intelligence: Beyond the Inspiring Vision
Abstract: Ambient Intelligence (AmI) has emerged in the past 10 years as a multidisciplinary field within ubiquitous computing, attracting considerable research, funding and publi...
Rui José, Helena Rodrigues, Nuno Otero
TIT
2010
130views Education» more  TIT 2010»
13 years 15 days ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar