Sciweavers

4543 search results - page 801 / 909
» Interactive Distributed Configuration
Sort
View
125
Voted
TEC
2002
166views more  TEC 2002»
15 years 2 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
TSMC
2002
102views more  TSMC 2002»
15 years 2 months ago
Modeling and analysis of air campaign resource allocation: a spatio-temporal decomposition approach
In this paper, we address the modeling and analysis issues associated with a generic theater level campaign where two adversaries pit their military resources against each other ov...
Debasish Ghose, M. Krichman, Jason L. Speyer, Jeff...
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 1 months ago
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...
104
Voted
IJRR
2010
110views more  IJRR 2010»
15 years 27 days ago
Design and Control of a Bio-inspired Human-friendly Robot
The increasing demand for physical interaction between humans and robots has led to the development of robots that guarantee safe behavior when human contact occurs. However, atta...
Dongjun Shin, Irene Sardellitti, Yong-Lae Park, Ou...
135
Voted
INFOCOM
2010
IEEE
15 years 27 days ago
Cross-layer Optimization for Wireless Networks with Deterministic Channel Models
Abstract—Existing work on cross-layer optimization for wireless networks adopts simple physical-layer models, i.e., treating interference as noise. In this paper, we adopt a dete...
Ziyu Shao, Minghua Chen, Salman Avestimehr, Shuo-Y...