Sciweavers

661 search results - page 89 / 133
» Robustness Guarantees for Anonymity
Sort
View
112
Voted
RTSS
2005
IEEE
15 years 6 months ago
Decentralized Utilization Control in Distributed Real-Time Systems
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distribut...
Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon D. Ko...
121
Voted
VISUALIZATION
2005
IEEE
15 years 6 months ago
Quality Mesh Generation for Molecular Skin Surfaces Using Restricted Union of Balls
Quality surface meshes for molecular models are desirable in the studies of protein shapes and functionalities. However, there is still no robust software that is capable to gener...
Ho-Lun Cheng, Xinwei Shi
VLDB
2005
ACM
139views Database» more  VLDB 2005»
15 years 6 months ago
Tree-Pattern Queries on a Lightweight XML Processor
Popular XML languages, like XPath, use “treepattern” queries to select nodes based on their structural characteristics. While many processing methods have already been propose...
Mirella Moura Moro, Zografoula Vagena, Vassilis J....
108
Voted
3DPVT
2002
IEEE
186views Visualization» more  3DPVT 2002»
15 years 5 months ago
A Gesture Recognition System Using 3D Data
In this paper a gesture recognition system using 3D data is described. The system relies on a novel 3D sensor that generates a dense range image of the scene. The main novelty of ...
Sotiris Malassiotis, Niki Aifanti, Michael G. Stri...
115
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Sajal K. Das, Sanjoy K. Sen, Naveen K. Kakani