Sciweavers

7133 search results - page 1000 / 1427
» Visualizing system latency
Sort
View
AI
2004
Springer
15 years 10 months ago
Intrinsic Representation: Bootstrapping Symbols from Experience
If we are to understand human-level intelligence, we need to understand how meanings can be learned without explicit instruction. I take a step toward that understanding by showing...
Stephen David Larson
ICCSA
2010
Springer
15 years 10 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
APSEC
1996
IEEE
15 years 9 months ago
M-base : An Application Development Environment for End-user Computing based on Message Flow
Explosive increase in end-user computing on distributed systems requires that end-users develop application software by themselves. One solution is given as aformula of "adom...
Takeshi Chusho, Yuji Konishi, Masao Yoshioka
GLOBECOM
2009
IEEE
15 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
ATAL
2008
Springer
15 years 6 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...
« Prev « First page 1000 / 1427 Last » Next »