Sciweavers

9186 search results - page 1440 / 1838
» A Module System for Scheme
Sort
View
DBSEC
2008
89views Database» more  DBSEC 2008»
15 years 5 months ago
A New Approach to Secure Logging
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
Di Ma, Gene Tsudik
NETWORKING
2008
15 years 5 months ago
Traffic Engineering and Routing in IP Networks with Centralized Control
There have been research initiatives in centralized control recently, which advocate that the control of an autonomous system (AS) should be performed in a centralized fashion. In ...
Jing Fu, Peter Sjödin, Gunnar Karlsson
MVA
2007
121views Computer Vision» more  MVA 2007»
15 years 5 months ago
Tracking Features with Global Motion Compensation for Drone Camera Servoing
This paper deals with visual servoing for a pan and tilt camera embedded in a drone. Video is transmitted to the ground where images are processed on a PC, and turret controls are...
Benoît Louvat, Laurent Bonnaud, Nicolas Marc...
RECOSOC
2007
116views Hardware» more  RECOSOC 2007»
15 years 5 months ago
IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking
Code Compression has been shown to be efficient in minimizing the memory requirements for embedded systems as well as in power consumption reduction and performance improvement. I...
Eduardo Wanderley Netto, Reouven Elbaz, Lionel Tor...
AAAI
2004
15 years 5 months ago
A General Solution to the Graph History Interaction Problem
Since the state space of most games is a directed graph, many game-playing systems detect repeated positions with a transposition table. This approach can reduce search effort by ...
Akihiro Kishimoto, Martin Müller 0003
« Prev « First page 1440 / 1838 Last » Next »