Sciweavers

6434 search results - page 1188 / 1287
» The Dynamic Data Cube
Sort
View
KI
2001
Springer
15 years 9 months ago
Extracting Situation Facts from Activation Value Histories in Behavior-Based Robots
The paper presents a new technique for extracting symbolic ground facts out of the sensor data stream in autonomous robots for use under hybrid control architectures, which compris...
Frank Schönherr, Mihaela Cistelecan, Joachim ...
TES
2001
Springer
15 years 9 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
ICNP
2000
IEEE
15 years 9 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
MOBICOM
2000
ACM
15 years 9 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
CGO
2010
IEEE
15 years 9 months ago
Umbra: efficient and scalable memory shadowing
Shadow value tools use metadata to track properties of application data at the granularity of individual machine instructions. These tools provide effective means of monitoring an...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
« Prev « First page 1188 / 1287 Last » Next »