Sciweavers

399 search results - page 55 / 80
» Iterator Types
Sort
View
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
15 years 6 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
ICPR
2008
IEEE
15 years 6 months ago
A performance controllable octree construction method
The conventional octree construction method is implemented iteratively at consecutive subdivision levels. The resultant octree models at different subdivision levels contain quite...
Zen Chen, Hong-Long Chou, Wen-Chao Chen
ICST
2008
IEEE
15 years 6 months ago
Verifying and Analyzing Adaptive Logic through UML State Models
It is becoming increasingly important to be able to adapt an application’s behavior at run time in response to changing requirements and environmental conditions. Adaptive progr...
Andres J. Ramirez, Betty H. C. Cheng
CIBCB
2007
IEEE
15 years 6 months ago
Evolving Extremal Epidemic Networks
The susceptible, infected, removed model for epidemics assumes that the population in which the epidemic takes place is well mixed. This strong assumption can be relaxed by permit...
Dan Ashlock, Fatemeh Jafargholi
CODES
2007
IEEE
15 years 6 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...