Sciweavers

3555 search results - page 184 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
WSC
1997
15 years 5 months ago
Selective Rerouting Using Simulated Steady State System Data
Effective operational control of a manufacturing system that has routing flexibility is dependent upon being able to make informed real-time decisions in the event of a system dis...
Catherine M. Harmonosky, Robert H. Farr, Ming-Chua...
PR
2002
202views more  PR 2002»
15 years 3 months ago
3D C-string: a new spatio-temporal knowledge representation for video database systems
In video database systems, one of the most important methods for discriminating the videos is by using the objects and the perception of spatial and temporal relations that exist ...
Anthony J. T. Lee, Han-Pang Chiu, Ping Yu
ISWC
2003
IEEE
15 years 9 months ago
Personal Position Measurement Using Dead Reckoning
This paper compares position measurement techniques using dead reckoning. We are seeking to find a technique which is suitable for use by pedestrians, and have compared a number ...
Cliff Randell, Chris Djiallis, Henk L. Muller
HICSS
2007
IEEE
183views Biometrics» more  HICSS 2007»
15 years 10 months ago
Rescuing Small and Medium-Sized Enterprises from Inefficient Information Systems - A Multi-disciplinary Method for ERP System Re
Enterprise resource planning (ERP) systems integrate companies’ multiple information systems and help adapt best practices for business processes. ERP systems are in most cases ...
Inka Vilpola, Ilkka Kouri, Kaisa Vään&au...
USENIX
1993
15 years 5 months ago
HighLight: Using a Log-structured File System for Tertiary Storage Management
Robotic storage devices offer huge storage capacity at a low cost per byte, but with large access times. Integrating these devices into the storage hierarchy presents a challenge ...
John T. Kohl, Carl Staelin, Michael Stonebraker