Sciweavers

3233 search results - page 253 / 647
» Validation Method for Intelligent Systems
Sort
View
SIGMETRICS
2006
ACM
15 years 10 months ago
Fluid modeling of pollution proliferation in P2P networks
P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsu...
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith...
ATAL
2005
Springer
15 years 9 months ago
How Bee-Like Agents Support Cultural Heritage
Abstract. Elderly people are a great repository of knowledge, the majority of which has never been gathered by formal means. In this paper we introduce an application of multi-agen...
Martí Fàbregas, Beatriz López...
146
Voted
SAC
2004
ACM
15 years 9 months ago
Concatenate feature extraction for robust 3D elliptic object localization
Developing an efficient object localization system for complicated industrial objects is an important, yet difficult robotic task. To tackle this problem, we have developed a syst...
Yuichi Motai, Akio Kosaka
DSN
2008
IEEE
15 years 10 months ago
Statistical Fault Injection
A method for Statistical Fault Injection (SFI) into arbitrary latches within a full system hardware-emulated model is validated against particle-beam-accelerated SER testing for a...
Pradeep Ramachandran, Prabhakar Kudva, Jeffrey W. ...
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
15 years 10 months ago
Prioritising and Linking Business and IT Goals in the Financial Sector
IT governance and strategic alignment are issues that are high on the agenda in many organisations. To address those challenges, it is important that an organisation has a good vi...
Wim Van Grembergen, Steven De Haes, Hilde Van Brem...