Sciweavers

1702 search results - page 262 / 341
» Doomed program points
Sort
View
125
Voted
IEEECIT
2006
IEEE
15 years 8 months ago
Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks
Coverage configuration is an important issue in large scale wireless sensor networks (WSNs). Existing coverage configuration methods are generally based on the concept of physical...
Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
IPPS
2006
IEEE
15 years 8 months ago
Seekable sockets: a mechanism to reduce copy overheads in TCP-based messaging
This paper extends the traditional socket interface to TCP/IP communication with the ability to seek rather than simply receive data in order. Seeking on a TCP socket allows a use...
Chase Douglas, Vijay S. Pai
109
Voted
IROS
2006
IEEE
126views Robotics» more  IROS 2006»
15 years 8 months ago
A System for Robotic Heart Surgery that Learns to Tie Knots Using Recurrent Neural Networks
Abstract— Tying suture knots is a time-consuming task performed frequently during Minimally Invasive Surgery (MIS). Automating this task could greatly reduce total surgery time f...
Hermann Georg Mayer, Faustino J. Gomez, Daan Wiers...
110
Voted
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
15 years 8 months ago
Towards an optimised VLSI design algorithm for the constant matrix multiplication problem
The efficient design of multiplierless implementa- The goal is to find the optimal sub-expressions across all N dot tions of constant matrix multipliers is challenged by the huge p...
Andrew Kinane, Valentin Muresan, Noel E. O'Connor
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 8 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...