Sciweavers

625 search results - page 81 / 125
» Optimal resource allocation for security in reliability syst...
Sort
View
EMSOFT
2004
Springer
15 years 5 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
CVPR
2010
IEEE
15 years 8 months ago
Exploring Features in a Bayesian Framework for Material Recognition
We are interested in identifying the material category, e.g. glass, metal, fabric, plastic or wood, from a single image of a surface. Unlike other visual recognition tasks in comp...
Ce Liu, Lavanya Sharan, Edward Adelson, Ruth Rosen...
SIGCOMM
2012
ACM
13 years 2 months ago
Flashback: decoupled lightweight wireless control
Unlike their cellular counterparts, Wi-Fi networks do not have the luxury of a dedicated control plane that is decoupled from the data plane. Consequently, Wi-Fi struggles to prov...
Asaf Cidon, Kanthi Nagaraj, Sachin Katti, Pramod V...
TON
1998
186views more  TON 1998»
14 years 11 months ago
Virtual path control for ATM networks with call level quality of service guarantees
— The configuration of virtual path (VP) connection services is expected to play an important role in the operation of large-scale asynchronous transfer mode (ATM) networks. A m...
Nikolaos Anerousis, Aurel A. Lazar
ATAL
2010
Springer
14 years 9 months ago
Occlusion-aware multi-UAV surveillance
We present an agent-based coordination and planning method for aerial surveillance of multiple urban areas using a group of fixed-wing unmanned aerial vehicles (UAVs). The method ...
Eduard Semsch, Michal Jakob, Dusan Pavlícek...