Sciweavers

667 search results - page 56 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
134
Voted
ICPADS
2006
IEEE
15 years 8 months ago
Flexible, Low-overhead Event Logging to Support Resource Scheduling
Flexible resource management and scheduling policies require detailed system-state information. Traditional, monolithic operating systems with a centralized kernel derive the requ...
Jan Stoess, Volkmar Uhlig
136
Voted
SIGGRAPH
1995
ACM
15 years 6 months ago
A frequency-domain analysis of head-motion prediction
The use of prediction to eliminate or reduce the effects of system delays in Head-Mounted Display systems has been the subject of several recent papers. A variety of methods have ...
Ronald Azuma, Gary Bishop
COMPSAC
2007
IEEE
15 years 6 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
138
Voted
BMCBI
2011
14 years 9 months ago
PICS-Ord: Unlimited Coding of Ambiguous Regions by Pairwise Identity and Cost Scores Ordination
Background: We present a novel method to encode ambiguously aligned regions in fixed multiple sequence alignments by ‘Pairwise Identity and Cost Scores Ordination’ (PICS-Ord)....
Robert K. Luecking, Brendan P. Hodkinson, Alexandr...
138
Voted
IFM
2009
Springer
155views Formal Methods» more  IFM 2009»
15 years 7 days ago
Application of Graph Transformation in Verification of Dynamic Systems
Abstract. A communication system evolves dynamically with the addition and deletion of services. In our previous work [12], a graph transformation system (GTS) was used to model th...
Zarrin Langari, Richard J. Trefler