Sciweavers

568 search results - page 87 / 114
» Developing an Ontology from the Application Up
Sort
View
ICRA
2007
IEEE
111views Robotics» more  ICRA 2007»
15 years 4 months ago
Upper body posture estimation for standing function restoration
— This paper addresses the problem of restoring standing in paralegia via functional electrical stimulation (FES) and investigates the relashionship between body posture and volu...
Gael Pages, Nacim Ramdani, Philippe Fraisse, David...
QEST
2007
IEEE
15 years 4 months ago
A Petri Net Model for Evaluating Packet Buffering Strategies in a Network Processor
Previous studies have shown that buffering packets in DRAM is a performance bottleneck. In order to understand the impediments in accessing the DRAM, we developed a detailed Petri...
Girish B. C., R. Govindarajan
ASWEC
2006
IEEE
15 years 3 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper
ACSAC
2005
IEEE
15 years 3 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
15 years 3 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han