Sciweavers

2875 search results - page 480 / 575
» Distributed Reactive Machines
Sort
View
142
Voted
ISORC
2008
IEEE
15 years 10 months ago
Hardware Objects for Java
Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled ...
Martin Schoeberl, Christian Thalinger, Stephan Kor...
127
Voted
SMI
2008
IEEE
139views Image Analysis» more  SMI 2008»
15 years 10 months ago
Noise in 3D laser range scanner data
This paper discusses noise in range data measured by a Konica Minolta Vivid 910 scanner. Previous papers considering denoising 3D mesh data have often used artificial data compri...
Xianfang Sun, Paul L. Rosin, Ralph R. Martin, Fran...
129
Voted
SRDS
2008
IEEE
15 years 10 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
136
Voted
ICAC
2007
IEEE
15 years 10 months ago
Autonomous Return on Investment Analysis of Additional Processing Resources
As the use of virtualization and partitioning grows, it becomes possible to deploy a multi-tier web-based application with a variable amount of computing power. This introduces th...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
133
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...