Sciweavers

2125 search results - page 280 / 425
» Points with Type-2 Operations
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
ICRA
2007
IEEE
157views Robotics» more  ICRA 2007»
14 years 4 months ago
Vegetation Detection for Driving in Complex Environments
— A key challenge for autonomous navigation in cluttered outdoor environments is the reliable discrimination between obstacles that must be avoided at all costs, and lesser obsta...
David M. Bradley, Ranjith Unnikrishnan, James Bagn...
IPPS
2007
IEEE
14 years 4 months ago
An Optimizing Compiler for Parallel Chemistry Simulations
Well designed domain specific languages enable the easy expression of problems, the application of domain specific optimizations, and dramatic improvements in productivity for t...
Jun Cao, Ayush Goyal, Samuel P. Midkiff, James M. ...
PG
2007
IEEE
14 years 4 months ago
Image-Space Caustics and Curvatures
Caustics are important visual phenomena, as well as challenging global illumination effects in computer graphics. Physically caustics can be interpreted from one of two perspectiv...
Xuan Yu, Feng Li, Jingyi Yu
VTC
2007
IEEE
129views Communications» more  VTC 2007»
14 years 4 months ago
Cross-Layer Partner-Based Fast Handoff Mechanism for IEEE 802.11 Wireless Networks
Abstract— In this paper, we propose a cross-layer partnerbased fast handoff mechanism based on HMIPv6, called as PHMIPv6 protocol. Our PHMIPv6 protocol is a cross-layer, layer-2 ...
Yuh-Shyan Chen, Wei-Han Hsiao, Kau-Lin Chiu