Sciweavers

1594 search results - page 151 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
CIKM
1997
Springer
15 years 7 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
124
Voted
IROS
2007
IEEE
131views Robotics» more  IROS 2007»
15 years 9 months ago
A hybrid approach for complete motion planning
Abstract— We present an efficient algorithm for complete motion planning that combines approximate cell decomposition (ACD) with probabilistic roadmaps (PRM). Our approach uses ...
Liangjun Zhang, Young J. Kim, Dinesh Manocha
119
Voted
WISEC
2010
ACM
15 years 10 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
CVPR
2009
IEEE
16 years 10 months ago
Extraction of Tubular Structures over an Orientation Domain
This paper presents a new method to extract a network of vessels centerlines from a medical image. The network is composed of local geodesics over a four-dimensional space that in...
Gabriel Peyré, Mickaël Péchaud,...
135
Voted
DATE
2006
IEEE
91views Hardware» more  DATE 2006»
15 years 7 months ago
Efficient incremental clock latency scheduling for large circuits
The clock latency scheduling problem is usually solved on the sequential graph, also called register-to-register graph. In practice, the the extraction of the sequential graph for...
Christoph Albrecht