Sciweavers

355 search results - page 56 / 71
» Risk Analysis of Robust System Design
Sort
View
WSCG
2003
142views more  WSCG 2003»
14 years 11 months ago
Three-Dimensional Object Recognition: Statistical Approach
The design of a general purpose artificial vision system capable of recognizing arbitrarily complex threedimensional objects without human intervention is still a challenging task...
R. Abdul Salam, M. A. Rodrigues
DAC
2007
ACM
15 years 1 months ago
Automotive Software Integration
A growing number of networked applications is implemented on increasingly complex automotive platforms with several bus standards and gateways. Together, they challenge the automo...
Razvan Racu, Arne Hamann, Rolf Ernst, Kai Richter
FAST
2010
15 years 15 hour ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
INFOCOM
2005
IEEE
15 years 3 months ago
Predicting Internet end-to-end delay: a multiple-model approach
This paper presents a novel approach to predict the Internet end-to-end delay using multiple-model (MM) methods. The basic idea of the MM method is to assume the system dynamics c...
Ming Yang, Jifeng Ru, X. Rong Li, Huimin Chen, Anw...
ESORICS
2010
Springer
14 years 10 months ago
A New Framework for RFID Privacy
Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID priv...
Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao