Sciweavers

614 search results - page 96 / 123
» A Distributed boundary detection algorithm for multi-robot s...
Sort
View
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 4 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
ANCS
2005
ACM
15 years 3 months ago
Resource mapping and scheduling for heterogeneous network processor systems
Task to resource mapping problems are encountered during (i) hardware-software co-design and (ii) performance optimization of Network Processor systems. The goal of the first pro...
Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinh...
MICCAI
2006
Springer
15 years 10 months ago
A New CAD System for the Evaluation of Kidney Diseases Using DCE-MRI
Acute rejection is the most common reason of graft failure after kidney transplantation, and early detection is crucial to survive the transplanted kidney function. In this paper, ...
Ayman El-Baz, Rachid Fahmi, Seniha Esen Yuksel, Al...
SAC
2006
ACM
15 years 3 months ago
Post-partition reconciliation protocols for maintaining consistency
This paper addresses design exploration for protocols that are employed in systems with availability-consistency tradeoffs. Distributed data is modelled as states of objects repl...
Mikael Asplund, Simin Nadjm-Tehrani
ICPADS
2005
IEEE
15 years 3 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...