Sciweavers

1791 search results - page 109 / 359
» Behavioral Operations
Sort
View
137
Voted
WWW
2008
ACM
16 years 5 months ago
Composite process oriented service discovery in preserving business and timed relation
This paper proposes an approach for solving the problem of composite process oriented service discovery with preserving business and timed relation. Key to our approach is the def...
Yu Dai, Lei Yang, Bin Zhang, Kening Gao
ICCCN
2008
IEEE
15 years 11 months ago
An Empirical Energy Model for Supercapacitor Powered Wireless Sensor Nodes
—The modeling of energy components in Wireless Sensor Network (WSN) simulation is important for obtaining realistic lifetime predictions and ensuring the faithful operation of en...
Geoff V. Merrett, Alex S. Weddell, A. P. Lewis, Ni...
DATE
2007
IEEE
124views Hardware» more  DATE 2007»
15 years 11 months ago
Worst-case design and margin for embedded SRAM
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...
Robert C. Aitken, Sachin Idgunji
DSN
2006
IEEE
15 years 10 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
IISWC
2006
IEEE
15 years 10 months ago
Constructing a Non-Linear Model with Neural Networks for Workload Characterization
Workload characterization involves the understanding of the relationship between workload configurations and performance characteristics. To better assess the complexity of worklo...
Richard M. Yoo, Han Lee, Kingsum Chow, Hsien-Hsin ...