Sciweavers

1885 search results - page 150 / 377
» Optimization of Component Connections for an Embedded Compon...
Sort
View
RAID
1999
Springer
15 years 2 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
IJRR
2002
96views more  IJRR 2002»
14 years 9 months ago
Phase Regulation of Decentralized Cyclic Robotic Systems
We address the problem of coupling cyclic robotic tasks to produce a specified coordinated behavior. Such coordination tasks are common in robotics, appearing in applications like...
Eric Klavins, Daniel E. Koditschek
GREC
2007
Springer
15 years 4 months ago
A System to Segment Text and Symbols from Color Maps
Automatic separation of text and symbols from graphics in document image is one of the fundamental aims in graphics recognition. In maps, separation of text and symbols from graphi...
Partha Pratim Roy, Eduard Vazquez, Josep Llad&oacu...
SIGOPS
2008
100views more  SIGOPS 2008»
14 years 8 months ago
Power management in the EPOS system
Power management strategies for embedded systems typically rely on static, application driven deactivation of components (e.g. sleep, suspend), or on dynamic voltage and frequency...
Geovani Ricardo Wiedenhoft, Lucas Francisco Wanner...
ECLIPSE
2005
ACM
14 years 12 months ago
Bridging the gap between technical and social dependencies with Ariadne
One of the reasons why large-scale software development is difficult is the number of dependencies that software engineers need to face: e.g., dependencies among the software comp...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...