Sciweavers

6167 search results - page 169 / 1234
» Can Refinement be Automated
Sort
View
145
Voted
ICRA
2003
IEEE
156views Robotics» more  ICRA 2003»
15 years 10 months ago
TopBot: automated network topology detection with a mobile robot
Abstract— We have demonstrated that a properlyequipped mobile robot can easily construct a detailed map of the wireless coverage of an urban environment. The Autonomous Vehicle f...
Paul Blaer, Peter K. Allen
ICRA
2000
IEEE
142views Robotics» more  ICRA 2000»
15 years 9 months ago
Automated CAD-Guided Automobile Part Dimensional Inspection
Structured light is one of the well-known methods in part dimensional inspection that have been successfully employed in various applications in the past decades. In this method, ...
Weihua Sheng, Ning Xi, Mumin Song, Yifan Chen, Jam...
NDSS
2000
IEEE
15 years 9 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
NOMS
2000
IEEE
141views Communications» more  NOMS 2000»
15 years 9 months ago
IconoNET: a tool for automated bandwidth allocation planning
Communication networks are expected to offer a wide range of services to an increasingly large number of users, with a diverse range of quality of service. This calls for efficien...
Christian Frei, Boi Faltings, George Melissargos, ...
141
Voted
ER
1998
Springer
123views Database» more  ER 1998»
15 years 8 months ago
From Object Oriented Conceptual Modeling to Automated Programming in Java
The development of Internet commercial applications and corporate Intranets around the world, which uses Java as the de facto standard language, is a significant topic in modern S...
Oscar Pastor, Vicente Pelechano, Emilio Insfr&aacu...