Sciweavers

4761 search results - page 692 / 953
» Generalizing Boundary Points
Sort
View
IEEECIT
2006
IEEE
15 years 10 months ago
Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks
Coverage configuration is an important issue in large scale wireless sensor networks (WSNs). Existing coverage configuration methods are generally based on the concept of physical...
Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
INFOCOM
2006
IEEE
15 years 10 months ago
Super-Fast Delay Tradeoffs for Utility Optimal Fair Scheduling in Wireless Networks
— We consider the fundamental delay tradeoffs for utility optimal scheduling in a general network with time varying channels. A network controller acts on randomly arriving data ...
Michael J. Neely
IROS
2006
IEEE
171views Robotics» more  IROS 2006»
15 years 10 months ago
Fast central catadioptric line extraction, estimation, tracking and structure from motion
— In this paper we present an analysis of 3D line projections for central catadioptric cameras from a projective perspective. Most algorithms consider the projection of lines as ...
Christopher Mei, Ezio Malis
RTSS
2006
IEEE
15 years 10 months ago
Diverse Soft Real-Time Processing in an Integrated System
The simple notion of soft real-time processing has fractured into a spectrum of diverse soft real-time types with a variety of different resource and time constraints. Schedulers ...
Caixue Lin, Tim Kaldewey, Anna Povzner, Scott A. B...
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 10 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...