Sciweavers

4307 search results - page 596 / 862
» Dynamic Spyware Analysis
Sort
View
ICRA
2006
IEEE
103views Robotics» more  ICRA 2006»
14 years 4 months ago
Soft Object Manipulation by Simultaneous Control of Motion and Deformation
— One of features of soft object manipulation is motion during deformation of the soft body. We analyze the stability of soft object manipulation by simultaneous control of motio...
Mizuho Shibata, Shinichi Hirai
ICRA
2006
IEEE
130views Robotics» more  ICRA 2006»
14 years 4 months ago
Mathematical Foundation for Hormone-inspired Control for Self-reconfigurable Robotic Systems
– In this paper, we present a general mathematical foundation of hormone-inspired control for the selfreconfigurable robotic system. Problem considered here is the lack of a math...
Feili Hou, Wei-Min Shen
ICSEA
2006
IEEE
14 years 4 months ago
Extracting Simulation Models from Complex Embedded Real-Time Systems
A modeling process is presented for extracting timingaccurate simulation models from complex embedded realtime systems. The process is supported by two complementary methods for t...
Johan Andersson, Joel Huselius, Christer Norstr&ou...
ICSNC
2006
IEEE
14 years 4 months ago
System capacity in OFDMA-based WiMAX
— In this paper, we study the capacity of broadband wireless OFDMA-based WiMAX systems, in the presence of both constant-bit-rate streaming traffic as well as elastic one, under...
Chadi Tarhini, Tijani Chahed
IEEEARES
2006
IEEE
14 years 4 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman