Sciweavers

5722 search results - page 961 / 1145
» Security Function Interactions
Sort
View
120
Voted
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Toward Self-Managed Media Stream Processing Service Overlays
On-demand media stream processing service provisioning on top of a service overlay network (SON) has emerged as a promising approach to providing quality-aware and failure-resilie...
Xiaohui Gu, Philip S. Yu
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
15 years 10 months ago
Path Planning for Planetary Exploration Rovers and Its Evaluation based on Wheel Slip Dynamics
— In this paper, a path planning and its evaluation method is described with taking into account wheel slip dynamics of lunar/planetary exploration rovers. The surface of the pla...
Genya Ishigami, Keiji Nagatani, Kazuya Yoshida
IROS
2007
IEEE
111views Robotics» more  IROS 2007»
15 years 10 months ago
Design of a modular snake robot
— Many factors such as size, power, and weight constrain the design of modular snake robots. Meeting these constraints requires implementing a complex mechanical and electrical a...
Cornell Wright III, Aaron Johnson, Aaron Peck, Zac...
ISMAR
2007
IEEE
15 years 9 months ago
Laser Pointer Tracking in Projector-Augmented Architectural Environments
We present a system that applies a custom-built pan-tilt-zoom camera for laser-pointer tracking in arbitrary real environments. Once placed in a building environment, it carries o...
Daniel Kurz, Ferry Hantsch, Max Grosse, Alexander ...
127
Voted
P2P
2007
IEEE
146views Communications» more  P2P 2007»
15 years 9 months ago
Modelling Real P2P Networks: The Effect of Altruism
We develop a model of the interaction of rational peers in an incentive-free Peer-to-Peer (P2P) network and use game theoretic analysis to derive results about peer and network be...
Dimitrios K. Vassilakis, Vasilis Vassalos