Sciweavers

2740 search results - page 192 / 548
» Approximating Component Selection
Sort
View
JSAC
2006
128views more  JSAC 2006»
15 years 3 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
DATE
2000
IEEE
105views Hardware» more  DATE 2000»
15 years 7 months ago
System Synthesis for Multiprocessor Embedded Applications
This paper presents the system synthesis techniques available in S3 E2 S, a CAD environment for the specification, simulation, and synthesis of embedded electronic systems that ca...
Luigi Carro, Márcio Eduardo Kreutz, Fl&aacu...
CHI
1999
ACM
15 years 7 months ago
Eye Tracking the Visual Search of Click-Down Menus
Click-down (or pull-down) menus have long been a key component of graphical user interfaces, yet we know surprisingly little about how users actually interact with such menus. Nil...
Michael D. Byrne, John R. Anderson, Scott Douglass...
CAD
2007
Springer
15 years 3 months ago
Boundary of the volume swept by a free-form solid in screw motion
The swept volume of a moving solid is a powerful computational and visualization concept. It provides an excellent aid for path and accessibility planning in robotics and for simu...
Jarek Rossignac, J. J. Kim, S. C. Song, K. C. Suh,...
124
Voted
PVLDB
2010
134views more  PVLDB 2010»
15 years 1 months ago
Conditioning and Aggregating Uncertain Data Streams: Going Beyond Expectations
Uncertain data streams are increasingly common in real-world deployments and monitoring applications require the evaluation of complex queries on such streams. In this paper, we c...
Thanh T. L. Tran, Andrew McGregor, Yanlei Diao, Li...