Sciweavers

1512 search results - page 222 / 303
» When Suboptimal Rules
Sort
View
ISORC
2008
IEEE
15 years 5 months ago
Adaptive Fuzzy Control for Utilization Management
—An increasing number of real-time systems are embedded in mission critical systems such as target tracking systems, in which workloads may dynamically vary, for example, dependi...
Mehmet H. Suzer, Kyoung-Don Kang
ADBIS
2008
Springer
131views Database» more  ADBIS 2008»
15 years 5 months ago
Increasing Expressiveness of Composite Events Using Parameter Contexts
The event-condition-action paradigm (also known as triggers or ECA rules) gives a database “active” capabilities – the ability to react automatically to changes in the databa...
Indrakshi Ray, Wei Huang
AINA
2007
IEEE
15 years 5 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
AINA
2007
IEEE
15 years 5 months ago
A Location-Aware Mobile Call Handling Assistant
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. At the same time we see an increasing need for people to limit their interactions on...
Ibrahim Bokharouss, Wayne Wobcke, Yiu-Wa Chan, And...
CEC
2007
IEEE
15 years 5 months ago
An investigation into dynamic problem solving in a hybrid evolutionary market-based multi-agent system
— Static resources allocation problems have been widely studied. More recently some of this attention has changed to focus on dynamic problems, where problem specifications, con...
D. J. Cornforth