Sciweavers

1215 search results - page 195 / 243
» On modeling, analysis, and optimization of packet aggregatio...
Sort
View
ICRA
2007
IEEE
222views Robotics» more  ICRA 2007»
15 years 4 months ago
Autonomous Vision-based Landing and Terrain Mapping Using an MPC-controlled Unmanned Rotorcraft
In this paper, we present a vision-based terrain mapping and analysis system, and a model predictive control (MPC)based flight control system, for autonomous landing of a helicop...
Todd Templeton, David Hyunchul Shim, Christopher G...
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
14 years 1 months ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
TOG
2008
291views more  TOG 2008»
14 years 9 months ago
Interactive 3D architectural modeling from unordered photo collections
We present an interactive system for generating photorealistic, textured, piecewise-planar 3D models of architectural structures and urban scenes from unordered sets of photograph...
Sudipta N. Sinha, Drew Steedly, Richard Szeliski, ...
LISA
2007
15 years 2 days ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
USS
2008
15 years 2 days ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam