Sciweavers

2421 search results - page 434 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
118
Voted
ACMACE
2008
ACM
15 years 5 months ago
Real binoculars with virtual functions for mixed environments
Though often desirable, the integration of real and virtual elements in mixed reality environments can be difficult. We propose a number of techniques to facilitate scene explorat...
Andrei Sherstyuk, Kin Lik Wang, Anton Treskunov, J...
135
Voted
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
15 years 5 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
147
Voted
IMECS
2007
15 years 5 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma
146
Voted
NETWORKING
2007
15 years 5 months ago
Localization for Large-Scale Underwater Sensor Networks
Abstract. In this paper, we study the localization problem in large-scale underwater sensor networks. The adverse aqueous environments, the node mobility, and the large network sca...
Zhong Zhou, Jun-Hong Cui, Shengli Zhou
135
Voted
IFIP13
2004
15 years 5 months ago
Toward A Human-Centered UML For Risk Analysis
: Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of t...
Jérémie Guiochet, Gilles Motet, Clau...