Sciweavers

279 search results - page 54 / 56
» Dynamic and Selective Combination of Extensions in Component...
Sort
View
ISCAPDCS
2007
13 years 7 months ago
Efficient soft QoS guarantee in mobile ad hoc networks
More and more Quality of Service (QoS) sensitive applications, such as streaming media, high bandwidth content distribution and VoIP, will be deployed in Mobile Ad hoc Networks (M...
Gaogang Xie, Zhenyu Li, Valérie Issarny, Al...
MICRO
1996
IEEE
97views Hardware» more  MICRO 1996»
13 years 10 months ago
Modulo Scheduling of Loops in Control-intensive Non-numeric Programs
Much of the previous work on modulo scheduling has targeted numeric programs, in which, often, the majority of the loops are well-behaved loop-counter-based loops without early ex...
Daniel M. Lavery, Wen-mei W. Hwu
ECCV
2004
Springer
14 years 7 months ago
Shape Reconstruction from 3D and 2D Data Using PDE-Based Deformable Surfaces
In this paper, we propose a new PDE-based methodology for deformable surfaces that is capable of automatically evolving its shape to capture the geometric boundary of the data and ...
Ye Duan, Liu Yang, Hong Qin, Dimitris Samaras
ICRA
2003
IEEE
163views Robotics» more  ICRA 2003»
13 years 11 months ago
An experimental study of hybrid switched system approaches to visual servoing
Abstract— In the recent past, many researchers have developed control algorithms for visual servo applications. In this paper, we introduce a new hybrid switched system approach,...
Nicholas R. Gans, Seth Hutchinson
WWW
2010
ACM
14 years 22 days ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...