Sciweavers

949 search results - page 140 / 190
» Fast Self-Recovering Controllers
Sort
View
ICRA
2008
IEEE
148views Robotics» more  ICRA 2008»
15 years 6 months ago
Visual saliency model for robot cameras
— Recent years have seen an explosion of research on the computational modeling of human visual attention in task free conditions, i.e., given an image predict where humans are l...
Nicholas J. Butko, Lingyun Zhang, Garrison W. Cott...
SCAM
2008
IEEE
15 years 6 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
SISW
2005
IEEE
15 years 5 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
SIGCOMM
2004
ACM
15 years 5 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
OOPSLA
2004
Springer
15 years 5 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...