Sciweavers

598 search results - page 111 / 120
» Conditional Sensor Deployment Using Evolutionary Algorithms
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
TROB
2008
228views more  TROB 2008»
13 years 7 months ago
Large-Scale 6-DOF SLAM With Stereo-in-Hand
In this paper, we describe a system that can carry4 out simultaneous localization and mapping (SLAM) in large in-5 door and outdoor environments using a stereo pair moving with 66 ...
Lina María Paz, Pedro Pinies, Juan D. Tard&...
UIC
2009
Springer
14 years 2 months ago
Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning
Abstract. In the last years, techniques for activity recognition have attracted increasing attention. Among many applications, a special interest is in the pervasive e-Health domai...
Daniele Riboni, Claudio Bettini
ROBIO
2006
IEEE
120views Robotics» more  ROBIO 2006»
14 years 1 months ago
Event Based Methodology for SuperMedia Enhanced Teleoperation
- SuperMedia provides human operators rich environmental information, thus providing telepresence and enhances efficiency of operation. However, coupling human with the remote envi...
Yang Liu, Amit Goradia, Yonghui Xue, Ning Xi
PODC
2010
ACM
13 years 11 months ago
Brief announcement: asynchronous bounded expected delay networks
We propose a natural generalisation of asynchronous bounded delay (ABD) network models. The commonly used ABD models assume a known bound on message delay. This assumption is ofte...
Rena Bakhshi, Jörg Endrullis, Wan Fokkink, Ju...