Sciweavers

6102 search results - page 1179 / 1221
» Modelling Environments for Distributed Simulation
Sort
View
PLDI
2009
ACM
14 years 5 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
INFOCOM
2009
IEEE
14 years 4 months ago
LayerP2P: A New Data Scheduling Approach for Layered Streaming in Heterogeneous Networks
—Although layered streaming in heterogeneous peer-to-peer networks has drawn great interest in recent years, there’s still a lack of systematical studies on its data scheduling...
Xin Xiao, Yuanchun Shi, Yuan Gao, Qian Zhang
CODES
2008
IEEE
14 years 4 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
IROS
2008
IEEE
184views Robotics» more  IROS 2008»
14 years 4 months ago
Morpho: A self-deformable modular robot inspired by cellular structure
— We present a modular robot design inspired by the creation of complex structures and functions in biology via deformation. Our design is based on the Tensegrity model of cellul...
Chih-Han Yu, Kristina Haller, Donald E. Ingber, Ra...
ICRA
2005
IEEE
116views Robotics» more  ICRA 2005»
14 years 3 months ago
Using Hierarchical EM to Extract Planes from 3D Range Scans
— Recently, the acquisition of three-dimensional maps has become more and more popular. This is motivated by the fact that robots act in the three-dimensional world and several t...
Rudolph Triebel, Wolfram Burgard, Frank Dellaert
« Prev « First page 1179 / 1221 Last » Next »