Sciweavers

1845 search results - page 219 / 369
» Computing the Angularity Tolerance
Sort
View
158
Voted
NSDI
2004
15 years 3 months ago
Constructing Services with Interposable Virtual Hardware
Virtual machine monitors (VMMs) have enjoyed a resurgence in popularity, since VMMs can help to solve difficult systems problems like migration, fault tolerance, code sandboxing, ...
Andrew Whitaker, Richard S. Cox, Marianne Shaw, St...
ICASSP
2010
IEEE
15 years 2 months ago
Texas Hold 'Em algorithms for distributed compressive sensing
This paper develops a new class of algorithms for signal recovery in the distributed compressive sensing (DCS) framework. DCS exploits both intra-signal and inter-signal correlati...
Stephen R. Schnelle, Jason N. Laska, Chinmay Hegde...
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 2 months ago
Cooperative Automated Worm Response and Detection Immune Algorithm
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these ...
Jungwon Kim, William O. Wilson, Uwe Aickelin, Juli...
134
Voted
CAD
2006
Springer
15 years 2 months ago
Cone spline approximation via fat conic spline fitting
Fat conic section and fat conic spline are defined. With well established properties of fat conic splines, the problem of approximating a ruled surface by a tangent smooth cone sp...
Xunnian Yang, Weiping Yang
IJRR
2006
145views more  IJRR 2006»
15 years 2 months ago
Coordinate-free Coverage in Sensor Networks with Controlled Boundaries via Homology
ABSTRACT. We introduce tools from computational homology to verify coverage in an idealized sensor network. Our methods are unique in that, while they are coordinate-free and assum...
V. de Silva, R. Ghrist