Sciweavers

15 search results - page 3 / 3
» On The Feasibility of Running Entity-Level Simulations on Gr...
Sort
View
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
13 years 3 months ago
Trajectory prediction in cluttered voxel environments
Abstract— Trajectory planning and optimization is a fundamental problem in articulated robotics. It is often viewed as a two phase problem of initial feasible path planning aroun...
Nikolay Jetchev, Marc Toussaint
NETWORKING
2010
13 years 6 months ago
Synapse: A Scalable Protocol for Interconnecting Heterogeneous Overlay Networks
This paper presents Synapse, a scalable protocol for information retrieval over the inter-connection of heterogeneous overlay networks. Applications on top of Synapse see those int...
Luigi Liquori, Cédric Tedeschi, Laurent Van...
BIBM
2010
IEEE
286views Bioinformatics» more  BIBM 2010»
13 years 3 months ago
Evaluation of short read metagenomic assembly
Advances in sequencing technologies have equipped researchers with the ability to sequence the collective genome of entire microbial communities commonly referred to as metagenomi...
Anveshi Charuvaka, Huzefa Rangwala
MOBISYS
2007
ACM
14 years 4 months ago
SmartSiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devi...
Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu ...
SASN
2006
ACM
13 years 11 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt