Sciweavers

1527 search results - page 269 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
SENSYS
2003
ACM
14 years 1 months ago
Integrated coverage and connectivity configuration in wireless sensor networks
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide cont...
Xiaorui Wang, Guoliang Xing, Yuanfang Zhang, Cheny...
RAS
2008
108views more  RAS 2008»
13 years 7 months ago
Towards long-lived robot genes
Robot projects are often evolutionary dead ends, with the software and hardware they produce disappearing without trace afterwards. Common causes include dependencies on uncommon ...
Paul M. Fitzpatrick, Giorgio Metta, Lorenzo Natale
TVCG
2010
147views more  TVCG 2010»
13 years 6 months ago
Superquadric Glyphs for Symmetric Second-Order Tensors
—Symmetric second-order tensor fields play a central role in scientific and biomedical studies as well as in image analysis and feature-extraction methods. The utility of displ...
Thomas Schultz, Gordon L. Kindlmann
ICSE
2005
IEEE-ACM
14 years 7 months ago
Main effects screening: a distributed continuous quality assurance process for monitoring performance degradation in evolving so
Developers of highly configurable performanceintensive software systems often use a type of in-house performance-oriented "regression testing" to ensure that their modif...
Cemal Yilmaz, Arvind S. Krishna, Atif M. Memon, Ad...
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
14 years 2 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...