Sciweavers

911 search results - page 120 / 183
» The Semantics of Event Prevention
Sort
View
TON
2002
170views more  TON 2002»
14 years 9 months ago
The BLUE active queue management algorithms
In order to stem the increasing packet loss rates caused by an exponential increase in network traffic, the IETF has been considering the deployment of active queue management tech...
Wu-chang Feng, Kang G. Shin, Dilip D. Kandlur, Deb...
DAGM
2009
Springer
14 years 7 months ago
HMM-Based Defect Localization in Wire Ropes - A New Approach to Unusual Subsequence Recognition
Abstract. Automatic visual inspection has become an important application of pattern recognition, as it supports the human in this demanding and often dangerous work. Nevertheless,...
Esther-Sabrina Platzer, Josef Nägele, Karl-He...
JTAER
2011
96views more  JTAER 2011»
14 years 4 months ago
Interoperability and Information Brokers in Public Safety: An Approach toward Seamless Emergency Communications
When a disaster occurs, the rapid gathering and sharing of crucial information among public safety agencies, emergency response units, and the public can save lives and reduce the...
Andreas Kühn, Michael Kaschewsky, Andreas Kap...
DAC
2011
ACM
13 years 9 months ago
Process-level virtualization for runtime adaptation of embedded software
Modern processor architectures call for software that is highly tuned to an unpredictable operating environment. Processlevel virtualization systems allow existing software to ada...
Kim M. Hazelwood
SKG
2006
IEEE
15 years 4 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han