Sciweavers

612 search results - page 102 / 123
» Evaluation of Response Time in Ethernet-based Automation Sys...
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 9 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
82
Voted
PAMI
2007
196views more  PAMI 2007»
14 years 9 months ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
85
Voted
CIKM
2010
Springer
14 years 8 months ago
StableBuffer: optimizing write performance for DBMS applications on flash devices
Flash devices have been widely used in embedded systems, laptop computers, and enterprise servers. However, the poor random writes have been an obstacle to running write-intensive...
Yu Li, Jianliang Xu, Byron Choi, Haibo Hu
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
14 years 7 months ago
A robust, low-cost and low-noise artificial skin for human-friendly robots
As robots and humans move towards sharing the same environment, the need for safety in robotic systems is of growing importance. Towards this goal of human-friendly robotics, a rob...
John Ulmen, Mark R. Cutkosky
143
Voted
TOMACS
2011
139views more  TOMACS 2011»
14 years 4 months ago
The double CFTP method
We consider the problem of the exact simulation of random variables Z that satisfy the distributional identity Z L = V Y + (1 − V )Z, where V ∈ [0, 1] and Y are independent, an...
Luc Devroye, Lancelot F. James