Sciweavers

142 search results - page 21 / 29
» Controlling Error Propagation in Mobile-Infrastructure Based...
Sort
View
COMPSAC
2009
IEEE
13 years 11 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
MM
1998
ACM
79views Multimedia» more  MM 1998»
13 years 12 months ago
Organizing Multicast Receivers Deterministically by Packet-Loss Correlation
The ability to trace multicast paths is currently available in the Internet by means of IGMP MTRACE packets. We introduce Tracer, the rst protocol that organizes the receivers of ...
Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-...
IPMI
2011
Springer
12 years 11 months ago
Optimal Weights for Multi-atlas Label Fusion
Multi-atlas based segmentation has been applied widely in medical image analysis. For label fusion, previous studies show that image similarity-based local weighting techniques pro...
Hongzhi Wang, Jung Wook Suh, John Pluta, Murat Alt...
PIMRC
2008
IEEE
14 years 2 months ago
Distributed digital locked loops for time/frequency locking in packet-based wireless communication
— In infrastructure-less wireless systems network-wise time and frequency synchronization can be achieved by exchanging mutual synchronization errors among neighboring nodes. Coo...
Umberto Spagnolini, Nicola Varanese, Osvaldo Simeo...
FROCOS
2000
Springer
13 years 11 months ago
Handling Differential Equations with Constraints for Decision Support
The behaviour of many systems is naturally modelled by a set of ordinary differential equations (ODEs) which are parametric. Since decisions are often based on relations over these...
Jorge Cruz, Pedro Barahona