Sciweavers

2421 search results - page 267 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
15 years 11 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang
FAST
2008
15 years 7 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
ECIS
2004
15 years 6 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
IWANN
1995
Springer
15 years 8 months ago
EL-SIM: a Development Environment for Neuro-Fuzzy Intelligent Controllers
1 This paper presents a new technique for the design of real-time controllers based on a hybrid approach which integrates several control strategies, such as intelligent controlle...
Marcello Chiaberge, G. Di Bene, S. Di Pascoli, R. ...
137
Voted
JCB
2007
94views more  JCB 2007»
15 years 4 months ago
A Quantile Method for Sizing Optical Maps
Optical mapping is an integrated system for the analysis of single DNA molecules. It constructs restriction maps (noted as “optical map”) from individual DNA molecules present...
Haifeng Li, Anton Valouev, David C. Schwartz, Mich...