Sciweavers

1548 search results - page 267 / 310
» Estimating Software Vulnerabilities
Sort
View
DATE
2005
IEEE
180views Hardware» more  DATE 2005»
15 years 4 months ago
A Coprocessor for Accelerating Visual Information Processing
Visual information processing will play an increasingly important role in future electronics systems. In many applications, e.g. video surveillance cameras, data throughput of mic...
Walter Stechele, L. Alvado Cárcel, Stephan ...
80
Voted
ICRA
2005
IEEE
158views Robotics» more  ICRA 2005»
15 years 4 months ago
Ball Detection and Predictive Ball Following Based on a Stereoscopic Vision System
— In this paper we describe an efficient software architecture for object-tracking, based on a stereoscopic vision system, that has been applied to a mobile robot controlled by ...
Davide Scaramuzza, Stefano Pagnottelli, Paolo Vali...
RTSS
2005
IEEE
15 years 4 months ago
Generalized Performance Management of Multi-Class Real-Time Imprecise Data Services
The intricacy of real-time data service management increases mainly due to the emergence of applications operating in open and unpredictable environments, increases in software co...
Mehdi Amirijoo, Nicolas Chaufette, Jörgen Han...
IMC
2005
ACM
15 years 4 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
EMSOFT
2005
Springer
15 years 4 months ago
Distributed-code generation from hybrid systems models for time-delayed multirate systems
Hybrid systems are an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. A simple extension, a network of comm...
Madhukar Anand, Sebastian Fischmeister, Jesung Kim...