Sciweavers

1995 search results - page 329 / 399
» From Data Flow Networks to Process Algebras
Sort
View
IDEAS
2003
IEEE
102views Database» more  IDEAS 2003»
15 years 3 months ago
Pushing Quality of Service Information and Requirements into Global Query Optimization
In recent years, a lot of research effort has been dedicated to the management of Quality of Service (QoS), mainly in the fields of telecommunication networks and multimedia syste...
Haiwei Ye, Brigitte Kerhervé, Gregor von Bo...
GISCIENCE
2008
Springer
123views GIS» more  GISCIENCE 2008»
14 years 11 months ago
A Theory of Change for Attributed Spatial Entities
Abstract. New methods of data collection, in particular the wide range of sensors and sensor networks that are being constructed, with the ability to collect real-time data streams...
John G. Stell, Michael F. Worboys
OPODIS
2004
14 years 11 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
MVA
2007
150views Computer Vision» more  MVA 2007»
14 years 11 months ago
Detecting the Degree of Anomal in Security Video
We have developed a method that can discriminate anomalous image sequences for more efficiently utilizing security videos. To match the wide popularity of security cameras, the me...
Kyoko Sudo, Tatsuya Osawa, Xiaojun Wu, Kaoru Wakab...
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
15 years 6 months ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...