Sciweavers

1717 search results - page 342 / 344
» Error concealment using a diffusion based method
Sort
View
SIGSOFT
2005
ACM
15 years 10 months ago
Permissive interfaces
A modular program analysis considers components independently and provides succinct summaries for each component, which can be used when checking the rest of the system. Consider ...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar
POPL
2008
ACM
15 years 10 months ago
Automatic inference of stationary fields: a generalization of java's final fields
Java programmers can document that the relationship between two objects is unchanging by declaring the field that encodes that relationship to be final. This information can be us...
Christopher Unkel, Monica S. Lam
AINA
2008
IEEE
15 years 4 months ago
ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) have specific constraints and stringent requirements in contrast to traditional wired and wireless computer networks. Among these specific requireme...
Khurram Shahzad, Arshad Ali, N. D. Gohar
ICRA
2008
IEEE
163views Robotics» more  ICRA 2008»
15 years 4 months ago
Human-guided surgical robot system for spinal fusion surgery: CoRASS
— There are two main limitations in the conventional robot-assisted spinal fusion surgery. Since the end effector in the state of art has a role of guiding the insertion pose of ...
Jongwon Lee, Keehoon Kim, Wan Kyun Chung, Seungmoo...
ICNP
2007
IEEE
15 years 4 months ago
Adaptive Optimization of Rate Adaptation Algorithms in Multi-Rate WLANs
— Rate adaptation is one of the basic functionalities in today’s 802.11 wireless LANs (WLANs). Although it is primarily designed to cope with the variability of wireless channe...
Jaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon...