Sciweavers

1687 search results - page 230 / 338
» Which pointer analysis should I use
Sort
View
WOSP
2005
ACM
15 years 10 months ago
Modeling the performance of a NAT/firewall network service for the IXP2400
The evolution towards IP-aware access networks creates the possibility (and, indeed, the desirability) of additional network services, like firewalling or NAT, integrated into th...
Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminc...
DIMEA
2008
176views Multimedia» more  DIMEA 2008»
15 years 6 months ago
Designing GUI for the user configuration of pervasive awareness applications
The vision of Pervasive and Ubiquitous Computing promises that our future environments will be furnished with an increasing number of computationally augmented artifacts. Conseque...
Eleni Romoudi, Theodosia Fokidou
ATAL
2003
Springer
15 years 9 months ago
Cooperative negotiation for soft real-time distributed resource allocation
In this paper we present a cooperative negotiation protocol that solves a distributed resource allocation problem while conforming to soft real-time constraints in a dynamic envir...
Roger Mailler, Victor R. Lesser, Bryan Horling
ATAL
2006
Springer
15 years 8 months ago
Efficient agent-based cluster ensembles
Numerous domains ranging from distributed data acquisition to knowledge reuse need to solve the cluster ensemble problem of combining multiple clusterings into a single unified cl...
Adrian K. Agogino, Kagan Tumer
HRI
2007
ACM
15 years 8 months ago
Robot expressionism through cartooning
We present a new technique for human-robot interaction called robot expressionism through cartooning. We suggest that robots utilise cartoon-art techniques such as simplified and ...
James Everett Young, Min Xin, Ehud Sharlin