Sciweavers

1885 search results - page 348 / 377
» Optimization of Component Connections for an Embedded Compon...
Sort
View
CONEXT
2007
ACM
15 years 1 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
CW
2004
IEEE
15 years 1 months ago
Modeling of Bodies and Clothes for Virtual Environments
Although graphical human modeling has been a long sought subject in computer graphics, when it comes to dealing with real-time applications, it raises a number of unique requireme...
Nadia Magnenat-Thalmann, Frederic Cordier, Hyewon ...
OGAI
1991
15 years 1 months ago
Knowledge-Based Generation of Illustrated Documents
The task of the knowledge-based presentation system WIP is the generation of a variety of multimodal documents from an input consisting of a formal description of the communicativ...
Wolfgang Wahlster, Elisabeth André, Som Ban...
APNOMS
2008
Springer
14 years 11 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
EDBT
2010
ACM
185views Database» more  EDBT 2010»
14 years 11 months ago
BP-Ex: a uniform query engine for business process execution traces
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. Analyzing the execution of such processes is critical for enforcing business ...
Eran Balan, Tova Milo, Tal Sterenzy