Sciweavers

5333 search results - page 40 / 1067
» Optimizing Computer System Configurations
Sort
View
122
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
Dynamic Configuration of Resource-Aware Services
An important emerging requirement for computing systems is the ability to adapt at run time, taking advantage of local computing devices, and coping with dynamically changing reso...
David Garlan, João Pedro Sousa, Mary Shaw, ...
113
Voted
IJCIA
2008
68views more  IJCIA 2008»
15 years 2 months ago
A Hybrid Estimation of Distribution Algorithm for CDMA Cellular System Design
Abstract: While code division multiple access (CDMA) is becoming a promising cellular communication system, the design for a CDMA cellular system configuration has posed a practica...
Jianyong Sun, Qingfu Zhang, Jin Li, Xin Yao
122
Voted
CHI
2005
ACM
16 years 2 months ago
A logic block enabling logic configuration by non-experts in sensor networks
Recent years have seen the evolution of networks of tiny low power computing blocks, known as sensor networks. In one class of sensor networks, a non-expert user, who has little o...
Susan Cotterell, Frank Vahid
118
Voted
ICPR
2000
IEEE
16 years 3 months ago
Trinocular Stereo for Non-Parallel Configurations
The constraint of a third camera in stereo vision is a useful tool for reducing ambiguity in matching. Most of the systems using trinocular stereo to date however, have used confi...
Jane Mulligan, Konstantinos Daniilidis
100
Voted
JCS
2002
94views more  JCS 2002»
15 years 1 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar