Sciweavers

10891 search results - page 1822 / 2179
» Combining Model Reductions
Sort
View
ICRA
2009
IEEE
110views Robotics» more  ICRA 2009»
15 years 10 months ago
Reactive grasping using optical proximity sensors
— We propose a system for improving grasping using fingertip optical proximity sensors that allows us to perform online grasp adjustments to an initial grasp point without requi...
Kaijen Hsiao, Paul Nangeroni, Manfred Huber, Ashut...
ICST
2009
IEEE
15 years 10 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
136
Voted
IEEECIT
2009
IEEE
15 years 10 months ago
Clustering of Software Systems Using New Hybrid Algorithms
—Software clustering is a method for increasing software system understanding and maintenance. Software designers, first use MDG graph to model the structure of software system. ...
Ali Safari Mamaghani, Mohammad Reza Meybodi
98
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks
Abstract— Although direct reciprocity (Tit-for-Tat) contribution systems have been successful in reducing freeloading in peerto-peer overlays, it has been shown that, unless the ...
Raul Landa, David Griffin, Richard G. Clegg, Eleni...
122
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Network Bandwidth Allocation via Distributed Auctions with Time Reservations
—This paper studies the problem of allocating network capacity through periodic auctions. Motivated primarily by a service overlay architecture, we impose the following condition...
Pablo Belzarena, Andrés Ferragut, Fernando ...
« Prev « First page 1822 / 2179 Last » Next »