Sciweavers

1791 search results - page 193 / 359
» Behavioral Operations
Sort
View
HICSS
2005
IEEE
96views Biometrics» more  HICSS 2005»
15 years 9 months ago
Network Centric Warfare in the U.S. Navy's Fifth Fleet
This case study was commissioned by the Office of Force Transformation in the United States Department of Defense to examine the employment of Network Centric Warfare (NCW) system...
John Kruse, Mark Adkins, Kimberly A. Holloman
118
Voted
ICPPW
2005
IEEE
15 years 9 months ago
A Practical Approach to the Rating of Barrier Algorithms Using the LogP Model and Open MPI
Large–scale parallel applications performing global synchronization may spend a significant amount of execution time waiting for the completion of a barrier operation. Conseque...
Torsten Hoefler, Lavinio Cerquetti, Torsten Mehlan...
133
Voted
IPCCC
2005
IEEE
15 years 9 months ago
Dynamic localization control for mobile sensor networks
Localization is a fundamental operation in mobile and self-configuring networks such as sensor networks and mobile ad hoc networks. For example, sensor location is often critical...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
CC
2005
Springer
323views System Software» more  CC 2005»
15 years 9 months ago
CodeSurfer/x86-A Platform for Analyzing x86 Executables
CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis algorithm called value-set analysis (VSA) to recover intermediate representations that...
Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, T...
ECSQARU
2005
Springer
15 years 9 months ago
Hydrologic Models for Emergency Decision Support Using Bayesian Networks
In the presence of a river flood, operators in charge of control must take decisions based on imperfect and incomplete sources of information (e.g., data provided by a limited numb...
Martín Molina, Raquel Fuentetaja, Luis Garr...