Sciweavers

11740 search results - page 2310 / 2348
» More Problems in Rewriting
Sort
View
IJRR
2010
186views more  IJRR 2010»
13 years 7 months ago
The Highly Adaptive SDM Hand: Design and Performance Evaluation
The inherent uncertainty associated with unstructured environments makes establishing a successful grasp difficult. Traditional approaches to this problem involve hands that are c...
Aaron M. Dollar, Robert D. Howe
IJWBC
2010
126views more  IJWBC 2010»
13 years 7 months ago
Self-supportive virtual communities
Learning Communities in healthcare is one approach in supporting practitioners and nurses to improve skills and knowledge and consequently support patients more efficiently. Web b...
Iraklis Varlamis, Ioannis Apostolakis
INFOCOM
2010
IEEE
13 years 7 months ago
Distributed Caching Algorithms for Content Distribution Networks
—The delivery of video content is expected to gain huge momentum, fueled by the popularity of user-generated clips, growth of VoD libraries, and wide-spread deployment of IPTV se...
Sem C. Borst, Varun Gupta, Anwar Walid
INFOCOM
2010
IEEE
13 years 7 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
INFOCOM
2010
IEEE
13 years 7 months ago
Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo System
—More fundamental than IP lookups and packet classification in routers is the extraction of fields such as IP Dest and TCP Ports that determine packet forwarding. While parsing...
Christos Kozanitis, John Huber, Sushil Singh, Geor...
« Prev « First page 2310 / 2348 Last » Next »