Sciweavers

1998 search results - page 282 / 400
» Situated Control Rules
Sort
View
125
Voted
ISCC
2009
IEEE
210views Communications» more  ISCC 2009»
15 years 11 months ago
Towards a Java bytecodes compiler for Nios II soft-core processor
Reconfigurable computing is one of the most recent research topics in computer science. The Altera™ Nios II soft-core processor can be included in a large set of reconfigurable ...
Willian dos Santos Lima, Renata Spolon Lobato, Ale...
SLE
2009
Springer
15 years 11 months ago
Language Boxes
As domain-specific modeling begins to attract widespread acceptance, pressure is increasing for the development of new domainspecific languages. Unfortunately these DSLs typicall...
Lukas Renggli, Marcus Denker, Oscar Nierstrasz
SIGCOMM
2009
ACM
15 years 11 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
153
Voted
CDC
2008
IEEE
136views Control Systems» more  CDC 2008»
15 years 11 months ago
Estimation over heterogeneous sensor networks
Abstract— Design trade-offs between estimation performance, processing delay and communication cost for a sensor scheduling problem is discussed. We consider a heterogeneous sens...
Henrik Sandberg, Maben Rabi, Mikael Skoglund, Karl...
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
15 years 11 months ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang