Sciweavers

1929 search results - page 340 / 386
» An Approach to Limit the Wynot Problem
Sort
View
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
14 years 2 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
ICIP
2005
IEEE
14 years 2 months ago
Automatic registration of 3D datasets using Gaussian fields
—In this paper we introduce a new 3D automatic registration method based on Gaussian fields and energy minimization. The method defines a simple ∞ C energy function, which is c...
Faysal Boughorbel, Andreas Koschan, Mongi A. Abidi
ICRA
2005
IEEE
139views Robotics» more  ICRA 2005»
14 years 2 months ago
Attitude Estimation for Dynamic Legged Locomotion Using Range and Inertial Sensors
— Legged robots offer exceptional mobility in uncharted terrains. Their dynamic nature yields unrivaled mobility, but serves to destabilize the motion estimation process that und...
Surya P. N. Singh, Kenneth J. Waldron
KBSE
2005
IEEE
14 years 2 months ago
Visualization-based analysis of quality for large-scale software systems
We propose an approach for complex software analysis based on visualization. Our work is motivated by the fact that in spite of years of research and practice, software developmen...
Guillaume Langelier, Houari A. Sahraoui, Pierre Po...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...