Sciweavers

571 search results - page 91 / 115
» From Control Flow to Dataflow
Sort
View
CCS
2006
ACM
14 years 11 days ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
INFOCOM
2000
IEEE
14 years 7 days ago
Effective Envelopes: Statistical Bounds on Multiplexed Traffic in Packet Networks
Abstract--A statistical network service which allows a certain fraction of traffic to not meet its QoS guarantees can extract additional capacity from a network by exploiting stati...
Robert Boorstyn, Almut Burchard, Jörg Liebehe...
JMIV
2006
124views more  JMIV 2006»
13 years 8 months ago
Segmentation of a Vector Field: Dominant Parameter and Shape Optimization
Vector field segmentation methods usually belong to either of three classes: methods which segment regions homogeneous in direction and/or norm, methods which detect discontinuiti...
Tristan Roy, Eric Debreuve, Michel Barlaud, Gilles...
SIAMAM
2008
82views more  SIAMAM 2008»
13 years 8 months ago
Optical Fiber Drawing and Dopant Transport
Optical fibers are made of glass with different refractive indices in the (inner) core and the (outer) cladding regions. The difference in refractive index arises due to a rapid tr...
Huaxiong Huang, Robert M. Miura, Jonathan J. Wylie
CVPR
2008
IEEE
14 years 10 months ago
The Kneed Walker for human pose tracking
The Kneed Walker is a physics-based model derived from a planar biomechanical characterization of human locomotion. By controlling torques at the knees, hips and torso, the model ...
Marcus A. Brubaker, David J. Fleet