Sciweavers

2822 search results - page 544 / 565
» Mining Optimized Ranges
Sort
View
DATE
2004
IEEE
144views Hardware» more  DATE 2004»
13 years 11 months ago
A Framework for Battery-Aware Sensor Management
A distributed sensor network (DSN) designed to cover a given region R, is said to be alive if there is at least one subset of sensors that can collectively cover (sense) the regio...
Sridhar Dasika, Sarma B. K. Vrudhula, Kaviraj Chop...
MICCAI
2000
Springer
13 years 11 months ago
Fixation-Based Surgery: A New Technique for Distal Radius Osteotomy
Abstract. Fixation-based surgery is a new technique for achieving difficult corrections in some orthopedic procedures. The method is premised on using a fixation device, such as a ...
H. Croitoru, Randy E. Ellis, Carolyn F. Small, Dav...
USS
2008
13 years 10 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
ACIVS
2008
Springer
13 years 9 months ago
Motion Recovery for Uncalibrated Turntable Sequences Using Silhouettes and a Single Point
Abstract. This paper addresses the problem of self-calibration and motion recovery for turntable sequences. Previous works exploited silhouette correspondences induced by epipolar ...
Hui Zhang, Ling Shao, Kwan-Yee Kenneth Wong
ARC
2008
Springer
95views Hardware» more  ARC 2008»
13 years 9 months ago
The Instruction-Set Extension Problem: A Survey
Over the last years, we have witnessed the increased use of Application-Specific Instruction-Set Processors (ASIPs). These ASIPs are processors that have a customizable instruction...
Carlo Galuzzi, Koen Bertels