Sciweavers

6906 search results - page 1119 / 1382
» An algorithm for modelling key terms
Sort
View
172
Voted
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 11 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
ATAL
2005
Springer
15 years 10 months ago
Coordinating multiple rovers with interdependent science objectives
This paper describes an integrated system for coordinating multiple rover behavior with the overall goal of collecting planetary surface data. The MISUS system combines techniques...
Tara A. Estlin, Daniel M. Gaines, Forest Fisher, R...
ATAL
2005
Springer
15 years 10 months ago
A cooperative multi-agent approach to free flight
The next generation of air traffic control will require automated decision support systems in order to meet safety, reliability, flexibility, and robustness demands in an environ...
Jared C. Hill, F. Ryan Johnson, James K. Archibald...
ICMI
2005
Springer
136views Biometrics» more  ICMI 2005»
15 years 10 months ago
Contextual recognition of head gestures
Head pose and gesture offer several key conversational grounding cues and are used extensively in face-to-face interaction among people. We investigate how dialog context from an ...
Louis-Philippe Morency, Candace L. Sidner, Christo...
174
Voted
ASPLOS
2004
ACM
15 years 10 months ago
Continual flow pipelines
Increased integration in the form of multiple processor cores on a single die, relatively constant die sizes, shrinking power envelopes, and emerging applications create a new cha...
Srikanth T. Srinivasan, Ravi Rajwar, Haitham Akkar...
« Prev « First page 1119 / 1382 Last » Next »