Sciweavers

341 search results - page 53 / 69
» Maturity-independent risk measures
Sort
View
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
14 years 3 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
ICRA
2005
IEEE
135views Robotics» more  ICRA 2005»
14 years 3 months ago
Rapid Development of Vision-Based Control for MAVs through a Virtual Flight Testbed
— We seek to develop vision-based autonomy for small-scale aircraft known as Micro Air Vehicles (MAVs). Development of such autonomy presents signiÞcant challenges, in no small ...
Jason Grzywna, Ashish Jain, Jason Plew, Michael C....
NCA
2005
IEEE
14 years 3 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan
IUI
2005
ACM
14 years 3 months ago
The centrality of pivotal points in the evolution of scientific networks
In this paper, we describe the development of CiteSpace as an integrated environment for identifying and tracking thematic trends in scientific literature. The goal is to simplify...
Chaomei Chen
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
14 years 3 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown