Sciweavers

159 search results - page 27 / 32
» When to Trigger Active Rules
Sort
View
103
Voted
HYBRID
2010
Springer
15 years 7 months ago
On a control algorithm for time-varying processor availability
We consider an anytime control algorithm for the situation when the processor resource availability is time-varying. The basic idea is to calculate the components of the control i...
Vijay Gupta
85
Voted
TEI
2009
ACM
89views Hardware» more  TEI 2009»
15 years 7 months ago
Running up Blueberry Hill: prototyping whole body interaction in harmony space
Musical harmony is considered to be one of the most and technically difficult parts of music. It is y taught formally via abstract, domain-specific concepts, principles, rules and...
Simon Holland, Paul Marshall, Jon Bird, Nick Sheep...
AINA
2007
IEEE
15 years 7 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
107
Voted
AINA
2007
IEEE
15 years 7 months ago
A Location-Aware Mobile Call Handling Assistant
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. At the same time we see an increasing need for people to limit their interactions on...
Ibrahim Bokharouss, Wayne Wobcke, Yiu-Wa Chan, And...
99
Voted
APWEB
2003
Springer
15 years 5 months ago
Extending a Web Browser with Client-Side Mining
Abstract. We present WBext (Web Browser extended), a web browser extended with client-side mining capabilities. WBext learns sophisticated user interests and browsing habits by tai...
Hongjun Lu, Qiong Luo, Yeuk Kiu Shun