Sciweavers

22 search results - page 4 / 5
» Robust space transformations for distance-based operations
Sort
View
CGF
2008
144views more  CGF 2008»
13 years 5 months ago
Global Intrinsic Symmetries of Shapes
Although considerable attention in recent years has been given to the problem of symmetry detection in general shapes, few methods have been developed that aim to detect and quant...
Maks Ovsjanikov, Jian Sun, Leonidas J. Guibas
TC
2010
13 years 14 days ago
Model-Driven System Capacity Planning under Workload Burstiness
In this paper, we define and study a new class of capacity planning models called MAP queueing networks. MAP queueing networks provide the first analytical methodology to describe ...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
CCS
2009
ACM
13 years 9 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
FLAIRS
2003
13 years 7 months ago
Advantages of Brahms for Specifying and Implementing a Multiagent Human-Robotic Exploration System
We have developed a model-based, distributed architecture that integrates diverse components in a system designed for lunar and planetary surface operations: an astronaut’s spac...
William J. Clancey, Maarten Sierhuis, Charis Kaski...
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 5 months ago
Ownership protection of shape datasets with geodesic distance preservation
Protection of one's intellectual property is a topic with important technological and legal facets. The significance of this issue is amplified nowadays due to the ease of da...
Michail Vlachos, Claudio Lucchese, Deepak Rajan, P...