Sciweavers

1020 search results - page 143 / 204
» Advanced Teleoperation Architecture
Sort
View
153
Voted
MOBISYS
2003
ACM
16 years 3 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
123
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Efficient geographic routing in multihop wireless networks
We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proxi...
Seungjoon Lee, Bobby Bhattacharjee, Suman Banerjee
118
Voted
ICCAD
2004
IEEE
100views Hardware» more  ICCAD 2004»
16 years 16 days ago
DynamoSim: a trace-based dynamically compiled instruction set simulator
Instruction set simulators are indispensable tools for the architectural exploration and verification of embedded systems. Different techniques have recently been proposed to spe...
Massimo Poncino, Jianwen Zhu
CVPR
2010
IEEE
16 years 1 days ago
Increasing depth resolution of Electron Microscopy of Neural circuits using Sparse Tomographic reconstruction
Future progress in neuroscience hinges on reconstruction of neuronal circuits to the level of individual synapses. Because of the specifics of neuronal architecture, imaging must ...
Ashok Veeraraghavan, Alex Genkin, Shiv Vitaladevun...
105
Voted
IEEEARES
2009
IEEE
15 years 10 months ago
A Framework for Understanding Botnets
Botnets have become a severe threat to the cyberspace. However, existing studies are typically conducted in an ad hoc fashion, by demonstrating specific analysis on captured bot ...
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu