Sciweavers

450 search results - page 70 / 90
» Structural and Behavioral Decomposition in Object Oriented M...
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ICCV
2009
IEEE
16 years 2 months ago
Sparsity Induced Similarity Measure for Label Propagation
Graph-based semi-supervised learning has gained considerable interests in the past several years thanks to its effectiveness in combining labeled and unlabeled data through labe...
Hong Cheng, Zicheng Liu, Jie Yang
IJRR
2006
172views more  IJRR 2006»
14 years 10 months ago
A Haptic Teleoperation Approach Based on Contact Force Control
This paper presents a new teleoperation approach using a virtual spring, and local contact force control on the slave robot. The operational space framework provides the control s...
Jaeheung Park, Oussama Khatib
EUROMICRO
1999
IEEE
15 years 2 months ago
Software Synthesis for System Level Design Using Process Execution Trees
Software synthesis for system level design languages becomes feasible because the current technology, pricing and application trends will most likely alleviate the industrial empha...
Leo J. van Bokhoven, Jeroen Voeten, Marc Geilen
100
Voted
NGITS
1993
Springer
15 years 2 months ago
AMOS - An Architecture for Active Mediators
AMOS (Active Mediators Object System) is an architecture to model, locate, search, combine, update, and monitor data in information systems with many work stations connected using...
Gustav Fahl, Tore Risch, Martin Sköld