Sciweavers

5333 search results - page 40 / 1067
» Optimizing Computer System Configurations
Sort
View
ICSE
2004
IEEE-ACM
15 years 12 months ago
Dynamic Configuration of Resource-Aware Services
An important emerging requirement for computing systems is the ability to adapt at run time, taking advantage of local computing devices, and coping with dynamically changing reso...
David Garlan, João Pedro Sousa, Mary Shaw, ...
IJCIA
2008
68views more  IJCIA 2008»
14 years 11 months ago
A Hybrid Estimation of Distribution Algorithm for CDMA Cellular System Design
Abstract: While code division multiple access (CDMA) is becoming a promising cellular communication system, the design for a CDMA cellular system configuration has posed a practica...
Jianyong Sun, Qingfu Zhang, Jin Li, Xin Yao
CHI
2005
ACM
16 years 6 days ago
A logic block enabling logic configuration by non-experts in sensor networks
Recent years have seen the evolution of networks of tiny low power computing blocks, known as sensor networks. In one class of sensor networks, a non-expert user, who has little o...
Susan Cotterell, Frank Vahid
ICPR
2000
IEEE
16 years 27 days ago
Trinocular Stereo for Non-Parallel Configurations
The constraint of a third camera in stereo vision is a useful tool for reducing ambiguity in matching. Most of the systems using trinocular stereo to date however, have used confi...
Jane Mulligan, Konstantinos Daniilidis
JCS
2002
94views more  JCS 2002»
14 years 11 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar