Sciweavers

1565 search results - page 228 / 313
» cluster 2006
Sort
View
JCP
2006
106views more  JCP 2006»
14 years 9 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JFR
2006
88views more  JFR 2006»
14 years 9 months ago
Discovering natural kinds of robot sensory experiences in unstructured environments
We derive categories directly from robot sensor data to address the symbol grounding problem. Unlike model-based approaches where human intuitive correspondences are sought betwee...
Daniel H. Grollman, Odest Chadwicke Jenkins, Frank...
JIIS
2006
147views more  JIIS 2006»
14 years 9 months ago
Mining sequential patterns from data streams: a centroid approach
In recent years, emerging applications introduced new constraints for data mining methods. These constraints are typical of a new kind of data: the data streams. In data stream pro...
Alice Marascu, Florent Masseglia
ENGL
2007
164views more  ENGL 2007»
14 years 9 months ago
Vision Based Target-Tracking Realized with Mobile Robots using Extended Kalman Filter
— The paper presents a novel scheme for target-tracking realized with two mobile robots, where one robot is configured as tracker and the other as moving target. Fuzzy C-means cl...
Sheli Sinha Chaudhuri, Amit Konar
JPDC
2006
112views more  JPDC 2006»
14 years 9 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang