Sciweavers

5544 search results - page 986 / 1109
» Three Inadequate Models
Sort
View
VISUALIZATION
2005
IEEE
15 years 3 months ago
Surface Reconstruction Via Contour Metamorphosis: An Eulerian Approach With Lagrangian Particle Tracking
We present a robust method for 3D reconstruction of closed surfaces from sparsely sampled parallel contours. A solution to this problem is especially important for medical segment...
Ola Nilsson, David E. Breen, Ken Museth
ISLPED
2005
ACM
93views Hardware» more  ISLPED 2005»
15 years 3 months ago
Power-aware code scheduling for clusters of active disks
In this paper, we take the idea of application-level processing on disks to one level further, and focus on an architecture, called Cluster of Active Disks (CAD), where the storag...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir
MSWIM
2005
ACM
15 years 3 months ago
Cellular universal IP: a low delay mobility scheme based on universal IP addressing
The concept of care-of-address (CoA) is a major cause of excessive handoff delay in Mobile IPv6 for real time multimedia traffic. Many schemes eliminate the use of CoA at the micr...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
MSWIM
2005
ACM
15 years 3 months ago
Sensor-assisted wi-fi indoor location system for adapting to environmental dynamics
Wi-Fi based indoor location systems have been shown to be both cost-effective and accurate, since they can attain meter-level positioning accuracy by using existing Wi-Fi infrastr...
Yi-Chao Chen, Ji-Rung Chiang, Hao-Hua Chu, Polly H...
PADS
2005
ACM
15 years 3 months ago
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information
Most well-known Internet worms, such as Code Red, Slammer, and Blaster, infected vulnerable computers by scanning the entire Internet IPv4 space. In this paper, we present a new s...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong...