Sciweavers

6102 search results - page 1179 / 1221
» Modelling Environments for Distributed Simulation
Sort
View
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
INFOCOM
2009
IEEE
15 years 11 months ago
LayerP2P: A New Data Scheduling Approach for Layered Streaming in Heterogeneous Networks
—Although layered streaming in heterogeneous peer-to-peer networks has drawn great interest in recent years, there’s still a lack of systematical studies on its data scheduling...
Xin Xiao, Yuanchun Shi, Yuan Gao, Qian Zhang
CODES
2008
IEEE
15 years 11 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
IROS
2008
IEEE
184views Robotics» more  IROS 2008»
15 years 11 months ago
Morpho: A self-deformable modular robot inspired by cellular structure
— We present a modular robot design inspired by the creation of complex structures and functions in biology via deformation. Our design is based on the Tensegrity model of cellul...
Chih-Han Yu, Kristina Haller, Donald E. Ingber, Ra...
ICRA
2005
IEEE
116views Robotics» more  ICRA 2005»
15 years 10 months ago
Using Hierarchical EM to Extract Planes from 3D Range Scans
— Recently, the acquisition of three-dimensional maps has become more and more popular. This is motivated by the fact that robots act in the three-dimensional world and several t...
Rudolph Triebel, Wolfram Burgard, Frank Dellaert
« Prev « First page 1179 / 1221 Last » Next »