Sciweavers

3135 search results - page 403 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
EUC
2006
Springer
15 years 8 months ago
Optimizing Scheduling Stability for Runtime Data Alignment
Runtime data alignment has been paid attention recently since it can allocate data segment to processors dynamically according to applications' requirement. One of the key opt...
Ching-Hsien Hsu, Chao-Yang Lan, Shih-Chang Chen
IJAHUC
2006
128views more  IJAHUC 2006»
15 years 4 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
EWCBR
2008
Springer
15 years 6 months ago
Competence-Preserving Case-Deletion Strategy for Case Base Maintenance
The main goal of a Case-Based Reasoning (CBR) system is to provide criteria for evaluating the internal behavior and task efficiency of a particular system for a given initial case...
Mohamed Karim Haouchine, Brigitte Chebel-Morello, ...
WETICE
1997
IEEE
15 years 8 months ago
MultiDisciplinary Design for Uninhabited Air Vehicles
Contemporary product design and process development is based on an iterative specify-evaluate-revise approach which is often time intensive and therein non-responsive to customer ...
Max Blair, Steven R. LeClair, Jeffrey V. Zweber, A...
RAID
2005
Springer
15 years 10 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...