Sciweavers

1594 search results - page 153 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
CSFW
2007
IEEE
15 years 9 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
110
Voted
ASAP
2007
IEEE
95views Hardware» more  ASAP 2007»
15 years 9 months ago
Performance Evaluation of Probe-Send Fault-tolerant Network-on-chip Router
With increasing reliability concerns for current and next generation VLSI technologies, fault-tolerance is fast becoming an integral part of system-on-chip and multicore architect...
Sumit D. Mediratta, Jeffrey T. Draper
BROADNETS
2006
IEEE
15 years 9 months ago
Traffic Grooming Techniques in Optical Networks
: With the increase of the number of wavelengths per fiber waveband switching has been proposed to decrease the number of switching ports in optical nodes. Another concept that of ...
Yabin Ye, Hagen Woesner, Imrich Chlamtac
141
Voted
WEA
2010
Springer
281views Algorithms» more  WEA 2010»
15 years 8 months ago
Distributed Time-Dependent Contraction Hierarchies
Server based route planning in road networks is now powerful enough to find quickest paths in a matter of milliseconds, even if detailed information on time-dependent travel times...
Tim Kieritz, Dennis Luxen, Peter Sanders, Christia...
150
Voted
IJCV
2007
159views more  IJCV 2007»
15 years 3 months ago
Monocular Vision for Mobile Robot Localization and Autonomous Navigation
This paper presents a new real-time localization system for a mobile robot. We show that autonomous navigation is possible in outdoor situation with the use of a single camera and ...
Eric Royer, Maxime Lhuillier, Michel Dhome, Jean-M...