Sciweavers

2006 search results - page 252 / 402
» Heuristic Security-Testing Methods
Sort
View
ICWL
2004
Springer
15 years 6 months ago
PKUSpace: A Collaborative Platform for Scientific Researching
This Paper introduces PKUSpace - a collaborative platform for scientific learning and researching. Supported by efficient automated metadata extraction and powerful text classifica...
Ming Zhang, Dongqing Yang, Zhi-Hong Deng, Ying Fen...
109
Voted
IWQOS
2004
Springer
15 years 6 months ago
Provisioning servers in the application tier for e-commerce systems
Abstract— Server providers that support e-commerce applications as a service to multiple e–commerce websites traditionally use a tiered server architecture. This architecture i...
Daniel A. Villela, Prashant Pradhan, Dan Rubenstei...
ROBOCUP
2004
Springer
85views Robotics» more  ROBOCUP 2004»
15 years 6 months ago
Optimizing Precision of Self-Localization in the Simulated Robotics Soccer
We show that all published visual data processing methods for the simulated robotic soccer so far were not utilizing all available information, because they were mainly based on he...
Vadim Kyrylov, David Brokenshire, Eddie Hou
128
Voted
ACSC
2003
IEEE
15 years 6 months ago
A Comparative Study for Domain Ontology Guided Feature Extraction
We introduced a novel method employing a hierarchical domain ontology structure to extract features representing documents in our previous publication (Wang 2002). All raw words i...
Bill B. Wang, Robert I. McKay, Hussein A. Abbass, ...
97
Voted
ISORC
2003
IEEE
15 years 6 months ago
Enhancing Time Triggered Scheduling with Value Based Overload Handling and Task Migration
Time triggered methods provide deterministic behaviour suitable for critical real-time systems. They perform less favourably, however, if the arrival times of some activities are ...
Jan Carlson, Tomas Lennvall, Gerhard Fohler