Sciweavers

5918 search results - page 959 / 1184
» A view of cloud computing
Sort
View
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
15 years 9 months ago
XCS for robust automatic target recognition
A primary strength of the XCS approach is its ability to create maximally accurate general rules. In automatic target recognition (ATR) there is a need for robust performance beyo...
B. Ravichandran, Avinash Gandhe, Robert E. Smith
124
Voted
HUC
2005
Springer
15 years 9 months ago
Time, Ownership and Awareness: The Value of Contextual Locations in the Home
Abstract. Our goal in this paper is to clearly delineate how households currently manage communication and coordination information; this will provide practitioners and designers w...
Kathryn Elliot, Carman Neustaedter, Saul Greenberg
HUC
2005
Springer
15 years 9 months ago
DigiDress: A Field Trial of an Expressive Social Proximity Application
In May 2005 Nokia Sensor application (www.nokia.com/sensor) was launched, allowing mobile phone users to create digital identity expressions, seen by other users within Bluetooth r...
Per Persson, Jan Blom, Younghee Jung
115
Voted
ICARIS
2005
Springer
15 years 9 months ago
Polymorphism and Danger Susceptibility of System Call DASTONs
We have proposed a metaphor “DAnger Susceptible daTa codON” (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are ...
Anjum Iqbal, Mohd Aizaini Maarof
ICSOC
2005
Springer
15 years 9 months ago
PerfSONAR: A Service Oriented Architecture for Multi-domain Network Monitoring
In the area of network monitoring a lot of tools are already available to measure a variety of metrics. However, these tools are often limited to a single administrative domain so ...
Andreas Hanemann, Jeff W. Boote, Eric L. Boyd, J&e...