Sciweavers

5948 search results - page 1165 / 1190
» Computing Robust Counter-Strategies
Sort
View
ASWSD
2004
Springer
15 years 3 months ago
Simulink Integration of Giotto/TDL
The paper first presents the integration options of what we call the Timing Description Language (TDL) with MathWorks' Simulink tools. Based on the paradigm of logical executi...
Wolfgang Pree, Gerald Stieglbauer, Josef Templ
CAISE
2004
Springer
15 years 3 months ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest
CCS
2004
ACM
15 years 3 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
ISER
2004
Springer
148views Robotics» more  ISER 2004»
15 years 3 months ago
The Berkeley Lower Extremity Exoskeleton Project
In October 2003, the first functional load-bearing and energetically autonomous exoskeleton, called the Berkeley Lower Extremity Exoskeleton (BLEEX) was demonstrated, walking at th...
H. Kazerooni
NN
2004
Springer
102views Neural Networks» more  NN 2004»
15 years 3 months ago
A Quantitative Evaluation of a Bio-inspired Sound Segregation Technique for Two- and Three-Source Mixtures
A sound source separation technique based on a bio-inspired neural network, capable of functioning in more than two-source mixtures, is proposed. Separation results are compared wi...
Ramin Pichevar, Jean Rouat
« Prev « First page 1165 / 1190 Last » Next »