Sciweavers

4841 search results - page 603 / 969
» On dynamic feature location
Sort
View
124
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
115
Voted
IUI
2011
ACM
14 years 3 months ago
Design and validation of two-handed multi-touch tabletop controllers for robot teleoperation
Controlling the movements of mobile robots, including driving the robot through the world and panning the robot’s cameras, typically requires many physical joysticks, buttons, a...
Mark Micire, Munjal Desai, Jill L. Drury, Eric McC...
97
Voted
LR
2011
107views more  LR 2011»
14 years 3 months ago
Modeling and stability analysis of autonomously controlled production networks
Abstract We present methods and tools for modeling autonomously controlled production networks and investigation of their stability properties. Production networks are described as...
Sergey Dashkovskiy, Michael Görges, Michael K...
SIGMETRICS
2011
ACM
270views Hardware» more  SIGMETRICS 2011»
14 years 3 months ago
Scalable monitoring via threshold compression in a large operational 3G network
Threshold-based performance monitoring in large 3G networks is very challenging for two main factors: large network scale and dynamics in both time and spatial domains. There exis...
Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Io...
109
Voted
PLDI
2012
ACM
13 years 3 months ago
Sound and precise analysis of parallel programs through schedule specialization
Parallel programs are known to be difficult to analyze. A key reason is that they typically have an enormous number of execution interleavings, or schedules. Static analysis over...
Jingyue Wu, Yang Tang, Gang Hu, Heming Cui, Junfen...