Sciweavers

9989 search results - page 1935 / 1998
» A CLP Approach to Modelling Systems
Sort
View
NSPW
2003
ACM
15 years 5 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
EDCC
2010
Springer
15 years 4 months ago
D2HT: The Best of Both Worlds, Integrating RPS and DHT
Distributed Hash Tables (DHTs) and Random Peer Sampling (RPS) provide important and complementary services in the area of P2P overlay networks. DHTs achieve efficient lookup whil...
Marin Bertier, François Bonnet, Anne-Marie ...
SIGGRAPH
1992
ACM
15 years 3 months ago
Interactive inspection of solids: cross-sections and interferences
To reduce the cost of correcting design errors, assemblies of mechanical parts are modeled using CAD systems and verified electronically before the designs are sent to manufacturi...
Jarek Rossignac, Abe Megahed, Bengt-Olaf Schneider
ATAL
2006
Springer
15 years 3 months ago
Continuous refinement of agent resource estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek ...
David N. Morley, Karen L. Myers, Neil Yorke-Smith
FGR
2006
IEEE
121views Biometrics» more  FGR 2006»
15 years 3 months ago
Optimal Hand Gesture Vocabulary Design Using Psycho-Physiological and Technical Factors
A global approach to hand gesture vocabulary design is proposed which includes human as well as technical design factors. The human centered desires of multiple users are implicit...
Helman Stern, Juan P. Wachs, Yael Edan
« Prev « First page 1935 / 1998 Last » Next »