Sciweavers

1528 search results - page 275 / 306
» Implementing Generalized Operator Overloading
Sort
View
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
NDSS
2008
IEEE
14 years 2 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ICCV
2007
IEEE
14 years 2 months ago
Dense Multiscale Motion Extraction from Cardiac Cine MR Tagging using HARP Technology
We propose an operational method to extract the left ventricle (LV) systole dynamics using HARmonic Phase (HARP) images extracted from tagged cardiac MR sequences. Established tec...
Luc Florack, Hans C. van Assen, Avan Suinesiaputra
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
14 years 2 months ago
Remote Low Frequency State Feedback Kinematic Motion Control for Mobile Robot Trajectory Tracking
— Teleoperated robots generally receive high level commands from a remote system, while accomplishing motion control through conventional means. We present a teleoperated system ...
Daniel Montrallo Flickinger, Mark A. Minor
ICRA
2007
IEEE
155views Robotics» more  ICRA 2007»
14 years 2 months ago
Dogged Learning for Robots
— Ubiquitous robots need the ability to adapt their behaviour to the changing situations and demands they will encounter during their lifetimes. In particular, non-technical user...
Daniel H. Grollman, Odest Chadwicke Jenkins