Sciweavers

114 search results - page 15 / 23
» On Infinite Cycles II
Sort
View
ICST
2009
IEEE
14 years 4 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
INFOCOM
2009
IEEE
14 years 4 months ago
VISA: Virtual Scanning Algorithm for Dynamic Protection of Road Networks
—This paper proposes a VIrtual Scanning Algorithm (VISA), tailored and optimized for road network surveillance. Our design uniquely leverages upon the facts that (i) the movement...
Jaehoon Jeong, Yu Gu, Tian He, David Du
EGOV
2009
Springer
14 years 4 months ago
eGIF4M: eGovernment Interoperability Framework for Mozambique
Harmonizing decentralized development of ICT solutions with centralized strategies, e.g., meant to favor reuse and optimization of resources, is a complex technical and organizatio...
Pavel Shvaiko, Adolfo Villafiorita, Alessandro Zor...
ICRA
2007
IEEE
157views Robotics» more  ICRA 2007»
14 years 4 months ago
Automatic Relocalisation for a Single-Camera Simultaneous Localisation and Mapping System
Abstract— We describe a fast method to relocalise a monocular visual SLAM (Simultaneous Localisation and Mapping) system after tracking failure. The monocular SLAM system stores ...
Brian Williams, Paul Smith, Ian D. Reid
IPPS
2006
IEEE
14 years 3 months ago
Multi-clock pipelined design of an IEEE 802.11a physical layer transmitter
Among different wireless LAN technologies 802.11a has recently become popular due to its high throughput, large system capacity, and relatively long range. In this paper, we prop...
Maryam Mizani, Daler N. Rakhmatov