Sciweavers

1663 search results - page 137 / 333
» Computer Security in the Real World
Sort
View
145
Voted
VC
2008
95views more  VC 2008»
15 years 3 months ago
1001 Acquisition viewpoints: efficient and versatile view-dependent modeling of real-world scenes
Modeling is a severe bottleneck for computer graphics applications. Manual modeling is time consuming and fails to capture the complexity of real world scenes. Automated modeling b...
Mihai Mudure, Voicu Popescu
136
Voted
SIGMETRICS
1998
ACM
15 years 3 months ago
Internet service performance failure detection
The increasing complexity of computer networks and our increasing dependence on them means enforcing reliability requirements is both more challenging and more critical. The expan...
Amy R. Ward, Peter W. Glynn, Kathy J. Richardson
144
Voted
ATMOS
2010
172views Optimization» more  ATMOS 2010»
15 years 2 months ago
Column Generation Heuristic for a Rich Arc Routing Problem
In this paper we address a real world optimisation problem, the Rail Track Inspection Scheduling Problem (RTISP). This problem consists of scheduling network inspection tasks. The...
Sébastien Lannez, Christian Artigues, Jean ...
157
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
144
Voted
COMPUTER
2000
128views more  COMPUTER 2000»
15 years 3 months ago
What's Ahead for Embedded Software?
hysical world. How do you adapt software abstractions designed merely to transform data to meet requirements like real-time constraints, concurrency, and stringent safety considera...
Edward A. Lee