Sciweavers

174 search results - page 13 / 35
» Do Actors Call Use Cases
Sort
View
JNW
2006
63views more  JNW 2006»
13 years 7 months ago
Operational Experiment of Seamless Handover of a Mobile Router using Multiple Care-of Address Registration
NEMO Basic Support (NEMO BS) adds a mobility function to IPv6 routers, such a router is called as a mobile router. The network behind the mobile router (mobile network) becomes log...
Keiichi Shima, Yojiro Uo, Nobuo Ogashiwa, Satoshi ...
IROS
2006
IEEE
132views Robotics» more  IROS 2006»
14 years 1 months ago
3D interaction technique to enhance telemanipulation tasks using virtual environment
Abstract— This paper gives preliminary results about the utilization of an interaction technique called FOLLOW-ME to fasten the selection task for teleoperation system. The imple...
Nassima Ouramdane-Djerrah, Frédéric ...
ISCA
2007
IEEE
103views Hardware» more  ISCA 2007»
14 years 2 months ago
Ginger: control independence using tag rewriting
The negative performance impact of branch mis-predictions can be reduced by exploiting control independence (CI). When a branch mis-predicts, the wrong-path instructions up to the...
Andrew D. Hilton, Amir Roth
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
AAAI
2000
13 years 9 months ago
A Game-Theoretic Approach to Constraint Satisfaction
We shed light on the connections between different approaches to constraint satisfaction by showing that the main consistency concepts used to derive tractability results for cons...
Phokion G. Kolaitis, Moshe Y. Vardi