Sciweavers

455 search results - page 66 / 91
» Dynamic well-spaced point sets
Sort
View
DSN
2008
IEEE
15 years 3 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ICHIM
2001
139views more  ICHIM 2001»
15 years 3 months ago
Automated 3D Recording of Archaeological Pottery
At excavations a large number of sherds of archaeological pottery is found. Since the documentation and administration of these fragments represent a temporal and personnel effort...
Martin Kampel, Robert Sablatnig
JIRS
2008
100views more  JIRS 2008»
15 years 1 months ago
Model-based Predictive Control of Hybrid Systems: A Probabilistic Neural-network Approach to Real-time Control
Abstract This paper proposes an approach for reducing the computational complexity of a model-predictive-control strategy for discrete-time hybrid systems with discrete inputs only...
Bostjan Potocnik, Gasper Music, Igor Skrjanc, Boru...
NN
1998
Springer
151views Neural Networks» more  NN 1998»
15 years 1 months ago
Evolutionary neurocontrollers for autonomous mobile robots
In this article we describe a methodology for evolving neurocontrollers of autonomous mobile robots without human intervention. The presentation, which spans from technological an...
Dario Floreano, Francesco Mondada
NETWORK
2007
121views more  NETWORK 2007»
15 years 1 months ago
Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks
Along with recent advances in mobile networking and portable computing technologies, there is a trend in the telecommunications industry toward the development of efficient ubiqui...
Tarik Taleb, Abdelhamid Nafaa, Liam Murphy, Kazuo ...