نتایج جستجو برای: non intrusive prediction

تعداد نتایج: 1547877  

2011
Tarek El-Moselhy Luca Daniel

In this paper we review some of the state of the art techniques for parasitic interconnect extraction in the presence of random geometrical variations due to uncertainties in the manufacturing processes. We summarize some of the most recent development in both sampling based (non-intrusive) and expansion based (intrusive) algorithms for the extraction of both general impedance and capacitance i...

2012
Tania Farinella Sonia Bergamaschi Laura Po

Several recommendation systems have been developed to support the user in choosing an interesting movie from multimedia repositories. The widely utilized collaborative-filtering systems focus on the analysis of user profiles or user ratings of the items. However, these systems decrease their performance at the start-up phase and due to privacy issues, when a user hides most of his personal data...

Journal: :Int. J. Cooperative Inf. Syst. 2006
George Spanoudakis Khaled Mahbub

This paper presents a framework for monitoring the compliance of systems composed of webservices with requirements set for them at run-time. This framework assumes systems composed of webservices which are co-coordinated by a service composition process expressed in BPEL and uses event calculus to specify the requirements to be monitored. These requirements may include behavioural properties of...

2001
James Hall Ian Pratt Ian M. Leslie

We introduce a novel passive network monitoring architecture which enables us to capture and integrate data from different levels of the protocol stack using a probe which can be placed at any arbitrary point in the network. We subject the data gathered to off-line analysis and show how, by modelling the dynamics of the protocols observed, we are able to extract information which would not be a...

Journal: :Ad Hoc Networks 2011
Eli De Poorter Stefan Bouckaert Ingrid Moerman Piet Demeester

Since energy is scarce in sensor nodes, wireless sensor networks aim to transmit as few packets as possible. To achieve this goal, sensor protocols often aggregate measured data from multiple sensor nodes into a single packet. In this paper, a survey of aggregation techniques and methods is given. Based on this survey, it is concluded that there are currently several dependencies between the ag...

Journal: :Softw., Pract. Exper. 2002
Tyng-Ruey Chuang Y. S. Kuo Chien-Min Wang

We describe the design and implementation of system architecture to support object introspection in C++. In this system, information is collected by parsing class declarations, and is used to build a supporting environment for object introspection. Our approach is non-intrusive because it requires no changes in the original class declarations and libraries; hence, binary compatibility between o...

2009
Fabian Bohnert Ingrid Zukerman

The vast amount of information presented in museums is often overwhelming to a visitor, making it difficult to select personally interesting exhibits. Advances in mobile computing and user modelling have made possible technology that can assist a visitor in this selection process. Such a technology can (1) utilise non-intrusive observations of a visitor’s behaviour in the physical space to lear...

Journal: :Int. J. Digital Multimedia Broadcasting 2010
Asiya Khan Lingfen Sun Emmanuel C. Ifeachor Jose Oscar Fajardo Fidel Liberal Harilaos Koumaras

The aim of this paper is to present video quality prediction models for objective non-intrusive, prediction of H.264 encoded video for all content types combining parameters both in the physical and application layer over Universal Mobile Telecommunication Systems (UMTS) networks. In order to characterize the Quality of Service (QoS) level, a learning model based on Adaptive Neural Fuzzy Infere...

2006
O. S. Barnouin-Jha S. Yamamoto T. Toriumi S. Sugita

A new experimental technique to measure crater growth is presented whereby a high speed video captures profiles of a crater forming after impact obtained using a vertical laser sheet centered on the impact point. Unlike previous so called “quarter-space experiments”, where projectiles were launched along a transparent Plexiglas sheet so that growth of half a crater could be viewed, the use of t...

2005
Kristina Lundqvist Jayakanth Srinivasan Sébastien Gorelov

High-integrity embedded systems operate in multiple modes, in order to ensure system availability in the face of faults. Unanticipated state-dependent faults that remain in software after system design and development behave like hardware transient faults: they appear, do the damage and disappear. The conventional approach used for handling task overruns caused by transient faults is to use a s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید