Sciweavers

543 search results - page 86 / 109
» Corrosion: Simulating and Rendering
Sort
View
84
Voted
LCN
2005
IEEE
15 years 3 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
QSHINE
2005
IEEE
15 years 3 months ago
A Per-Class QoS Service Model in IEEE 802.11e WLANs
Abstract -- In this paper, we study the provision of perclass QoS for IEEE 802.11e Enhanced Distributed Channel Access (EDCA) WLANs. We propose two mechanisms, called BIWF-SP and I...
Jeng Farn Lee, Wanjiun Liao, Meng Chang Chen
VISUALIZATION
2005
IEEE
15 years 3 months ago
Visualization of White Matter Tracts with Wrapped Streamlines
Diffusion tensor imaging is a magnetic resonance imaging method which has gained increasing importance in neuroscience and especially in neurosurgery. It acquires diffusion proper...
Frank Enders, Natascha Sauber, Dorit Merhof, Peter...
96
Voted
VISUALIZATION
2005
IEEE
15 years 3 months ago
Example-based Volume Illustrations
Scientific illustrations use accepted conventions and methodologies to effectively convey object properties and improve our understanding. We present a method to illustrate volum...
Aidong Lu, David S. Ebert
83
Voted
PATMOS
2005
Springer
15 years 3 months ago
Energy Characterization of Garbage Collectors for Dynamic Applications on Embedded Systems
Abstract. Modern embedded devices (e.g. PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems inclu...
José Manuel Velasco, David Atienza, Katzali...