Sciweavers

614 search results - page 36 / 123
» A Distributed boundary detection algorithm for multi-robot s...
Sort
View
SSS
2010
Springer
118views Control Systems» more  SSS 2010»
14 years 8 months ago
Modeling and Analyzing Periodic Distributed Computations
The earlier work on predicate detection has assumed that the given computation is finite. Detecting violation of a liveness predicate requires that the predicate be evaluated on a...
Anurag Agarwal, Vijay K. Garg, Vinit A. Ogale
ICPP
2006
IEEE
15 years 3 months ago
A Parallel External-Memory Frontier Breadth-First Traversal Algorithm for Clusters of Workstations
— This paper presents a parallel external-memory algorithm for performing a breadth-first traversal of an implicit graph on a cluster of workstations. The algorithm is a paralle...
Robert Niewiadomski, José Nelson Amaral, Ro...
ICDE
2008
IEEE
209views Database» more  ICDE 2008»
15 years 11 months ago
Distributed Monitoring of Peer-to-Peer Systems
In this paper, we are concerned with the distributed monitoring of P2P systems. We introduce the P2P Monitor system and a new declarative language, namely P2PML, for specifying mo...
Serge Abiteboul, Bogdan Marinoiu, Pierre Bourhis
93
Voted
ICMCS
2009
IEEE
140views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Resource-adaptive multimedia analysis on stream mining systems
Large-scale multimedia semantic concept detection requires realtime identification of a set of concepts in streaming video or large image datasets. The potentially high data volum...
Deepak S. Turaga, Rong Yan, Olivier Verscheure, Br...
ICARIS
2004
Springer
15 years 3 months ago
Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of ...
Uwe Aickelin, Julie Greensmith, Jamie Twycross