Sciweavers

3516 search results - page 469 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
AC
2005
Springer
15 years 4 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
IJCIM
2002
99views more  IJCIM 2002»
15 years 4 months ago
A distributed, event-driven control architecture for flexibly automated manufacturing systems
This paper presents a new distributed real-time control architecture for flexibly automated production systems. The modelling assumptions underlying the design en by, and abstract,...
Jonghun Park, Spyros A. Reveliotis, Douglas A. Bod...
137
Voted
AGENTS
2000
Springer
15 years 9 months ago
Agent communication transfer protocol
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
Alexander Artikis, Jeremy Pitt, Christos Stergiou
TII
2008
132views more  TII 2008»
15 years 4 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
114
Voted
ICCV
2009
IEEE
16 years 9 months ago
Feature-Centric Efficient Subwindow Search
embedded in a sliding-window scheme. Such exhaustive search involves massive computation. Efficient Subwindow Search (ESS) [11] avoids this by means of branch and bound. However...
Alain Lehmann, Bastian Leibe, Luc van Gool