Search Results - "INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005"

Refine Results
  1. 1

    A survey of digital image watermarking techniques by Potdar, V.M., Han, S., Chang, E.

    “…Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is a lot of work begin conducted in different branches…”
    Get full text
    Conference Proceeding
  2. 2

    Service-oriented architectures for devices - the SIRENA view by Jammes, F., Smit, H.

    “…This paper outlines the perspectives opened by the application of the service-orientation paradigm for realizing high-level communications between…”
    Get full text
    Conference Proceeding
  3. 3

    Executing real-time constrained control applications modelled in IEC 61499 with respect to dynamic reconfiguration by Zoitl, A., Grabmair, G., Auinger, F., Sunder, C.

    “…New fast moving markets demand flexible, adaptable production facilities to allow manufacturing companies a fast reaction on consumer needs. Reconfigurable…”
    Get full text
    Conference Proceeding
  4. 4

    A real-time Linux execution environment for function-block based distributed control applications by Doukas, G.S., Thramboulidis, K.C.

    “…The function block (FB) construct has been adopted by recent IEC standards for the design of reusable, interoperable, distributed control applications…”
    Get full text
    Conference Proceeding
  5. 5

    An IEC 61499 application generator for scan-based industrial controllers by Lastra, J.L.M., Godinho, L., Lobov, A., Tuokko, R.

    “…In order to cope with today's market uncertainties, manufacturing is required to rapidly adapt and react to changes and unpredictable scenarios. These are…”
    Get full text
    Conference Proceeding
  6. 6

    Fingerprinted secret sharing steganography for robustness against image cropping attacks by Potdar, V.M., Han, S., Chang, E.

    “…Steganography is the art and science of hiding information. In this paper we propose a conceptual framework for fingerprinted secret sharing steganography. We…”
    Get full text
    Conference Proceeding
  7. 7

    A multiagent based control approach for evolvable assembly systems by Barata, J., Camarinha-Matos, L., Onori, M.

    “…The work presented in this paper intends to clarify how multiagents can be an adequate paradigm to solve the challenges imposed by evolvable assembly systems…”
    Get full text
    Conference Proceeding
  8. 8

    Web based methodology for engineering and maintenance of distributed control systems: the TORERO approach by Schwab, C., Tangermann, M., Ferrarini, L.

    “…This paper presents the architecture and the methodology of a distributed control system (DCS) which is based on intelligent field devices and an integrative…”
    Get full text
    Conference Proceeding
  9. 9

    Multi-agent based information access services for condition monitoring in process automation by Pirttioja, T., Pakonen, A., Seilonen, I., Halme, A., Koskinen, K.

    “…This paper studies issues concerning the application of goal-oriented information agents to condition monitoring tasks in process automation. In the presented…”
    Get full text
    Conference Proceeding
  10. 10

    Trustworthy service selection and composition - reducing the entropy of service-oriented Web by Liu, W.

    “…Current e-service selection relies upon service registries to make recommendations. It is almost impossible to capture and make use of valuable personal…”
    Get full text
    Conference Proceeding
  11. 11

    Design and implementation of distributed hierarchical automation and control systems with IEC 61499 by Ferrarini, L., Veber, C.

    “…The paper presents a prototypical implementation of a Java thread-based run-time environment for IEC 61499 applications and its use in the application design…”
    Get full text
    Conference Proceeding
  12. 12

    DETECTIVE: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining by Islam, M.Z., Brankovic, L.

    “…Data mining is a powerful tool for information discovery from huge datasets. Various sectors, including commercial, government, financial, medical, and…”
    Get full text
    Conference Proceeding
  13. 13

    Dynamic spatial block arrangement scheduling in shipbuilding industry using genetic algorithm by Varghese, R., Duck Young Yoon

    “…In any large heavy industry like that of ship building, there exist a lot of complications for the arrangement of building blocks optimally for the minimal…”
    Get full text
    Conference Proceeding
  14. 14

    Proxy-and-hook: a Java-based distributed object caching by Banditwattanawong, T., Maruyama, K., Hidaka, S., Washizaki, H.

    “…Scalability is a stringent requirement to every evolving information system. One of the key solutions to the scalability is caching. Most distributed object…”
    Get full text
    Conference Proceeding
  15. 15

    FASPRO: fast computer tool for the analysis of propagation in mobile communications by de Adana, F.S., Gutierrez, O., Gonzalez, I., Catedra, M.F.

    “…FASPRO is an accurate and extremely efficient tool to perform deterministic analysis of propagation in urban picocells and microcells. A fully 3D propagation…”
    Get full text
    Conference Proceeding
  16. 16

    Architecture for automation system development based on IEC 61499 standard by Vyatkin, V., Karras, S., Pfeiffer, T.

    “…This paper introduces an idea of a validatable architecture for software intensive industrial automation systems. The validation means will be provided through…”
    Get full text
    Conference Proceeding
  17. 17

    M-CI/sup 2/: modelling cyber interdependencies between critical infrastructures by Kim, H.M., Biehl, M., Buzacott, J.A.

    “…For Canadians, recent events such as the Ontario/US power blackout of 2003 and the SAKS scare highlight the importance of protection of infrastructure of…”
    Get full text
    Conference Proceeding
  18. 18

    Integral resource optimization network - a new solution on power markets by Roesener, C., Palensky, P., Weihs, M., Lorenz, B., Stadler, M.

    “…Many of today's European power systems are influenced by the deregulated energy market. Although demand and supply result in free prices and customers are free…”
    Get full text
    Conference Proceeding
  19. 19

    An energy-aware elevator group control system by Soyoon Lee, Hyokyung Bahn

    “…As the trend for mega high-rise buildings continues, efficient scheduling of group elevator systems is becoming increasingly important. In this paper, we…”
    Get full text
    Conference Proceeding
  20. 20

    Application of UML in plant modeling for model-based verification: UML translation to TNCES by Lobov, A., Lastra, J.L.M., Tuokko, R.

    “…There do exist dozens of formal languages and formalisms that may be used for modeling different phenomena of real world. The time for industrial acceptance of…”
    Get full text
    Conference Proceeding