Sciweavers

2421 search results - page 434 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ACMACE
2008
ACM
13 years 12 months ago
Real binoculars with virtual functions for mixed environments
Though often desirable, the integration of real and virtual elements in mixed reality environments can be difficult. We propose a number of techniques to facilitate scene explorat...
Andrei Sherstyuk, Kin Lik Wang, Anton Treskunov, J...
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
13 years 11 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
IMECS
2007
13 years 11 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma
NETWORKING
2007
13 years 11 months ago
Localization for Large-Scale Underwater Sensor Networks
Abstract. In this paper, we study the localization problem in large-scale underwater sensor networks. The adverse aqueous environments, the node mobility, and the large network sca...
Zhong Zhou, Jun-Hong Cui, Shengli Zhou
IFIP13
2004
13 years 11 months ago
Toward A Human-Centered UML For Risk Analysis
: Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of t...
Jérémie Guiochet, Gilles Motet, Clau...