Sciweavers

708 search results - page 88 / 142
» Timing closure: the solution and its problems
Sort
View
MM
2005
ACM
371views Multimedia» more  MM 2005»
15 years 3 months ago
Data grid for large-scale medical image archive and analysis
Storage and retrieval technology for large-scale medical image systems has matured significantly during the past ten years but many implementations still lack cost-effective backu...
H. K. Huang, Aifeng Zhang, Brent J. Liu, Zheng Zho...
DSN
2007
IEEE
15 years 4 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 3 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
ICRA
2003
IEEE
127views Robotics» more  ICRA 2003»
15 years 3 months ago
Constrained initialisation for bearing-only SLAM
— Simultaneous Localisation And Mapping (SLAM) is a stochastic map building method which permits consistent robot navigation without requiring an a priori map. The map is built i...
Tim Bailey
GD
1998
Springer
15 years 2 months ago
Using Graph Layout to Visualize Train Interconnection Data
We consider the problem of visualizing interconnections in railway systems. Given time tables from systems with thousands of trains, we are to visualize basic properties of the co...
Ulrik Brandes, Dorothea Wagner