Sciweavers

3555 search results - page 678 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
MIDDLEWARE
2007
Springer
15 years 7 months ago
Got predictability?: experiences with fault-tolerant middleware
Unpredictability in COTS-based systems often manifests as occasional instances of uncontrollably-high response times. A particular category of COTS systems, fault-tolerant (FT) mid...
Tudor Dumitras, Priya Narasimhan
CVPR
2001
IEEE
16 years 3 months ago
Clustering Art
We extend a recently developed method [1] for learning the semantics of image databases using text and pictures. We incorporate statistical natural language processing in order to...
Kobus Barnard, Pinar Duygulu, David A. Forsyth
WS
2005
ACM
15 years 6 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
DEXA
2004
Springer
110views Database» more  DEXA 2004»
15 years 6 months ago
An a Priori Approach for Automatic Integration of Heterogeneous and Autonomous Databases
Data integration is the process that gives users access to multiple data sources though queries against a global schema. Semantic heterogeneity has been identified as the most imp...
Ladjel Bellatreche, Guy Pierra, Dung Nguyen Xuan, ...
IAT
2003
IEEE
15 years 6 months ago
Problem-solving in open environments
With the increasing use of the internet, many problemsolving tasks such as resource allocation, scheduling, planning, and configuration pose themselves in an open setting involvi...
Santiago Macho-Gonzalez, Boi Faltings