A computer system often has multiple power management modules controlling different power knobs. Uncoordinated operation of these knobs not only leads to suboptimal operation but ...
Aman Kansal, Jie Liu, Abhishek Singh, Ripal Nathuj...
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
— This paper investigates Grid computing from the point of view three basic computing platforms. The platform consists of virtual compute resources, a programming environment all...
We present a low cost, hybrid active/passive 3D scanning system based on an off-the-shelf camera, a laser stripe illuminator and a turntable. The system combines the good accuracy ...
Carlo Colombo, Dario Comanducci, Alberto Del Bimbo
This paper presents a model of a nomadic middleware system with support for temporal consistency of structures semantically associated to XML-documents. Specially defined high-lev...
Dmitry S. Kochnev, Tatiana Kochurova, Alexander Sl...