Sciweavers

4650 search results - page 766 / 930
» Generating and evaluating evaluative arguments
Sort
View
EMSOFT
2010
Springer
14 years 11 months ago
Reducing stack with intra-task threshold priorities in real-time systems
In the design of hard real-time systems, the feasibility of the task set is one of the primary concerns. However, in embedded systems with scarce resources, optimizing resource us...
Gang Yao, Giorgio C. Buttazzo
ICIP
2010
IEEE
14 years 11 months ago
Global motion temporal filtering for in-loop deblocking
One of the most severe problems in hybrid video coding is its block-based approach, which leads to distortions called blocking artifacts. These artifacts affect not only the subje...
Alexander Glantz, Andreas Krutz, Thomas Sikora
INFOCOM
2010
IEEE
14 years 11 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou
INFOCOM
2010
IEEE
14 years 11 months ago
Efficient Similarity Estimation for Systems Exploiting Data Redundancy
Many modern systems exploit data redundancy to improve efficiency. These systems split data into chunks, generate identifiers for each of them, and compare the identifiers among ot...
Kanat Tangwongsan, Himabindu Pucha, David G. Ander...
IOT
2010
14 years 11 months ago
DEHEMS: A user-driven domestic energy monitoring system
Persuasive energy monitoring technology has the potential to inspire sustainable energy lifestyles within the home. However, to effect positive ecological behaviour change, a more ...
Vasughi Sundramoorthy, Qi Liu, Grahame Cooper, Nig...