Sciweavers

26354 search results - page 5063 / 5271
» How we refactor, and how we know it
Sort
View
ICRA
2008
IEEE
131views Robotics» more  ICRA 2008»
15 years 8 months ago
Towards a needle driver robot for radiofrequency ablation of tumors under continuous MRI
— This paper presents an initial design and feasibility study for a 1-DOF Magnetic Resonance Imaging (MRI) compatible needle driver robot for radiofrequency ablation (RFA). This ...
Rebecca Kokes, Kevin Lister, Rao Gullapalli, Bao Z...
131
Voted
ISCA
2008
IEEE
142views Hardware» more  ISCA 2008»
15 years 8 months ago
Improving NAND Flash Based Disk Caches
Flash is a widely used storage device that provides high density and low power, appealing properties for general purpose computing. Today, its usual application is in portable spe...
Taeho Kgil, David Roberts, Trevor N. Mudge
ITNG
2008
IEEE
15 years 8 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
104
Voted
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
15 years 8 months ago
Characterization of IP flows eligible for lambda-connections in optical networks
Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...
123
Voted
PIMRC
2008
IEEE
15 years 8 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...
« Prev « First page 5063 / 5271 Last » Next »