Sciweavers

6300 search results - page 1193 / 1260
» We have it easy, but do we have it right
Sort
View
EMSOFT
2010
Springer
14 years 10 months ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...
99
Voted
IPPS
2010
IEEE
14 years 10 months ago
Scalable failure recovery for high-performance data aggregation
Many high-performance tools, applications and infrastructures, such as Paradyn, STAT, TAU, Ganglia, SuperMon, Astrolabe, Borealis, and MRNet, use data aggregation to synthesize lar...
Dorian C. Arnold, Barton P. Miller
121
Voted
P2P
2010
IEEE
136views Communications» more  P2P 2010»
14 years 10 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
113
Voted
CVPR
2011
IEEE
14 years 8 months ago
A Large-scale Benchmark Dataset for Event Recognition in Surveillance Video
We introduce a new large-scale video dataset designed to assess the performance of diverse visual event recognition algorithms with a focus on continuous visual event recognition ...
Sangmin Oh, Anthony Hoogs, A.G.Amitha Perera, Chia...
154
Voted
CDC
2010
IEEE
183views Control Systems» more  CDC 2010»
14 years 7 months ago
Application of potent potential functions in eye/head movement control
In this paper we study the human eye movement and the head movement system as a simple mechanical control system. Most of the time, eye movements obey Listing's constraint, wh...
Bijoy K. Ghosh, Indika Wijayasinghe
« Prev « First page 1193 / 1260 Last » Next »