Sciweavers

16093 search results - page 3151 / 3219
» On the optimality of the neighbor-joining algorithm
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
RAM
2008
IEEE
124views Robotics» more  RAM 2008»
14 years 2 months ago
Mechatronics Considerations for Assisting Humans
Mechatronics technologies are now steadily penetrating in our daily lives. We are surrounded by mechatronic products and interact with them in many ways. In particular, mechatroni...
Masayoshi Tomizuka
BROADNETS
2007
IEEE
14 years 2 months ago
Fair bandwidth allocation framework for heterogeneous multi-radio Wireless Mesh Networks
Abstract—To reap the benefits of advances in wireless technologies as well as provide backward compatibility with current investments, future wireless routers that constitute th...
Shree Raman, Aura Ganz, Ramgopal R. Mettu
CBMS
2007
IEEE
14 years 2 months ago
Influence of Dictionary Size on the Lossless Compression of Microarray Images
A key challenge in the management of microarray data is the large size of images that constitute the output of microarray experiments. Therefore, only the expression values extrac...
Robert Bierman, Rahul Singh
COMSWARE
2007
IEEE
14 years 2 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri
« Prev « First page 3151 / 3219 Last » Next »