Sciweavers

1352 search results - page 238 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SOICT
2010
13 years 3 months ago
Constraint-based local search for solving non-simple paths problems on graphs: application to the routing for network covering p
Routing problems have been considered as central problems in the fields of transportation, distribution and logistics. LS(Graph) is a generic framework allowing to model and solve...
Pham Quang Dung, Phan-Thuan Do, Yves Deville, Tuon...
INFOCOM
2000
IEEE
14 years 1 months ago
End-to-End Congestion Control Schemes: Utility Functions, Random Losses and ECN Marks
We present a framework for designing end-to-end congestion control schemes in a network where each user may have a different utility function and may experience non-congestion-re...
Srisankar S. Kunniyur, Rayadurgam Srikant
ICRA
2007
IEEE
156views Robotics» more  ICRA 2007»
14 years 3 months ago
Development and Application of a New Steady-Hand Manipulator for Retinal Surgery
— This paper describes the development and initial testing of a new and optimized version of a steady-hand manipulator for retinal microsurgery. In the steady-hand paradigm, the ...
Ben Mitchell, John Koo, Iulian Iordachita, Peter K...
MM
2004
ACM
277views Multimedia» more  MM 2004»
14 years 2 months ago
Avatar-mediated face tracking and lip reading for human computer interaction
Advanced human computer interaction requires automatic reading of human face in order to make the computer interact with human in the same way as human-to-human communication. We ...
Xiaozhou Wei, Lijun Yin, Zhiwei Zhu, Qiang Ji
SRDS
2003
IEEE
14 years 2 months ago
Group Communication Protocols under Errors
Group communication protocols constitute a basic building block for highly dependable distributed applications. Designing and correctly implementing a group communication system (...
Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ra...