Sciweavers

2801 search results - page 439 / 561
» On the Adequateness of the Connection Method
Sort
View
PRDC
2006
IEEE
15 years 4 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....
SMI
2006
IEEE
152views Image Analysis» more  SMI 2006»
15 years 4 months ago
A Laplacian Based Approach for Free-Form Deformation of Sparse Low-degree IMplicit Surfaces
Sparse Low-degree IMplicit (SLIM) surface [11] is a recently developed non-conforming surface representation. In this paper, a method for free-form deformation of SLIM surfaces is...
Yutaka Ohtake, Takashi Kanai, Kiwamu Kase
TRIDENTCOM
2006
IEEE
15 years 4 months ago
Creating wireless multi-hop topologies on space-constrained indoor testbeds through noise injection
— To evaluate routing protocols on a controlled indoor wireless testbed, the radio range must be compressed so that larger multi-hop topologies can be mapped into a laboratorysiz...
Sanjit Krishnan Kaul, Marco Gruteser, Ivan Seskar
WIOPT
2006
IEEE
15 years 4 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
WISE
2006
Springer
15 years 4 months ago
2D/3D Web Visualization on Mobile Devices
Abstract. Visualization is able to present the rich Web information intuitively and make the Web search/mining more productive. Mobile computing is able to provide the flexibility...
Yi Wang, Li-Zhu Zhou, Jianhua Feng, Lei Xie, Chun ...