Sciweavers

12637 search results - page 2396 / 2528
» Security for Extensible Systems
Sort
View
JIRS
1998
100views more  JIRS 1998»
15 years 4 months ago
Reactive Robots in the Service of Production Management
In this paper, we advocate the use of reactive robots in industrial process control and production management. It is explained why reactive robots are well-suited to modern industr...
Elpida Tzafestas
JMIV
1998
112views more  JMIV 1998»
15 years 4 months ago
Differential and Integral Geometry of Linear Scale-Spaces
Linear scale-space theory provides a useful framework to quantify the differential and integral geometry of spatio-temporal input images. In this paper that geometry comes about by...
Alfons H. Salden, Bart M. ter Haar Romeny, Max A. ...
TSE
1998
115views more  TSE 1998»
15 years 4 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
TPDS
2002
127views more  TPDS 2002»
15 years 4 months ago
Adaptive Bandwidth Reservation and Admission Control in QoS-Sensitive Cellular Networks
How to keep the probability of hand-off drops within a prespecified limit is a very important Quality-of-Service (QoS) issue in cellular networks because mobile users should be abl...
Sunghyun Choi, Kang G. Shin
WINET
2002
169views more  WINET 2002»
15 years 4 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
« Prev « First page 2396 / 2528 Last » Next »