Sciweavers

3135 search results - page 248 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
GLVLSI
2006
IEEE
143views VLSI» more  GLVLSI 2006»
15 years 10 months ago
SACI: statistical static timing analysis of coupled interconnects
Process technology and environment-induced variability of gates and wires in VLSI circuits make timing analyses of such circuits a challenging task. Process variation can have a s...
Hanif Fatemi, Soroush Abbaspour, Massoud Pedram, A...
ICCV
2011
IEEE
14 years 4 months ago
Robust Topological Features for Deformation Invariant Image Matching
Local photometric descriptors are a crucial low level component of numerous computer vision algorithms. In practice, these descriptors are constructed to be invariant to a class o...
Edgar Lobaton, Ramanarayan Vasudevan, Ron Alterovi...
CVPR
2001
IEEE
16 years 6 months ago
Scene-Consistent Detection of Feature Points in Video Sequences
Detection of feature points in images is an important preprocessing stage for many algorithms in Computer Vision. We address the problem of detection of feature points in video se...
Ariel Tankus, Yehezkel Yeshurun
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...