Sciweavers

120 search results - page 11 / 24
» Loops under Strategies ... Continued
Sort
View
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 3 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
ICCAD
2008
IEEE
97views Hardware» more  ICCAD 2008»
14 years 5 months ago
Integrated code and data placement in two-dimensional mesh based chip multiprocessors
— As transistor sizes continue to shrink and the number of transistors per chip keeps increasing, chip multiprocessors (CMPs) are becoming a promising alternative to remain on th...
Taylan Yemliha, Shekhar Srikantaiah, Mahmut T. Kan...
CVPR
2008
IEEE
14 years 10 months ago
A mobile vision system for robust multi-person tracking
We present a mobile vision system for multi-person tracking in busy environments. Specifically, the system integrates continuous visual odometry computation with tracking-bydetect...
Andreas Ess, Bastian Leibe, Konrad Schindler, Luc ...
ICRA
2000
IEEE
93views Robotics» more  ICRA 2000»
14 years 1 months ago
Grasping Curved Objects through Rolling
Grasping a curved object free in the plane may be done through rolling a pair of fingers on the object’s boundary. Each finger is equipped with a tactile sensor able to record...
Yan-Bin Jia
HPDC
1996
IEEE
14 years 23 days ago
Customized Dynamic Load Balancing for a Network of Workstations
Load balancing involves assigning to each processor, work proportional to its performance, minimizing the execution time of the program. Althoughstatic load balancing can solve ma...
Mohammed Javeed Zaki, Wei Li, Srinivasan Parthasar...