Sciweavers

2080 search results - page 381 / 416
» Measuring empirical computational complexity
Sort
View
CODES
2006
IEEE
15 years 11 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
196
Voted
ICRA
2006
IEEE
110views Robotics» more  ICRA 2006»
15 years 11 months ago
Speeding-up Rao-blackwellized SLAM
— Recently, Rao-Blackwellized particle filters have become a popular tool to solve the simultaneous localization and mapping problem. This technique applies a particle filter i...
Giorgio Grisetti, Gian Diego Tipaldi, Cyrill Stach...
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 11 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
15 years 9 months ago
The nullspace method - a unifying paradigm to fault detection
— The nullspace method is a powerful framework to solve the synthesis problem of fault detection filters in the most general setting. It is also well suited to address the least...
András Varga
VVS
1998
IEEE
126views Visualization» more  VVS 1998»
15 years 9 months ago
Semi-Automatic Generation of Transfer Functions for Direct Volume Rendering
Although direct volume rendering is a powerful tool for visualizing complex structures within volume data, the size and complexity of the parameter space controlling the rendering...
Gordon L. Kindlmann, James W. Durkin