Sciweavers

1512 search results - page 144 / 303
» Principles of IEEE 802.11s
Sort
View
EUROMICRO
2004
IEEE
14 years 1 months ago
CoBFIT: A Component-Based Framework for Intrusion Tolerance
In this paper, we present the architecture of CoBFIT, a component-based framework for building intrusion-tolerant distributed systems. The CoBFIT framework, by virtue of its desig...
HariGovind V. Ramasamy, Adnan Agbaria, William H. ...
ESCIENCE
2006
IEEE
14 years 1 months ago
Applying Advance Reservation to Increase Predictability of Workflow Execution on the Grid
ct In this paper we present an extension to devise and implement advance reservation as part of the scheduling and resource management services of the ASKALON Grid application deve...
Marek Wieczorek, Mumtaz Siddiqui, Alex Villaz&oacu...
ICCV
1995
IEEE
14 years 1 months ago
A Quantitative Analysis of View Degeneracy and its use for Active Focal Length control
W e quantify the observation by Kender and Freudenstein [6] that degenerate views occupy a significant fraction of the viewing sphere surrounding an object. This demonstrates that...
David Wilkes, Sven J. Dickinson, John K. Tsotsos
ICRA
1995
IEEE
65views Robotics» more  ICRA 1995»
14 years 1 months ago
Robot Localization Using a Computer Vision Sextant
This paper explores the possibility of using Sun altitude for localization of a robot in totally unknown territory. A set of Sun altitudes is obtained by processing a sequence of ...
Fabio Gagliardi Cozman, Eric Krotkov
INFOCOM
1995
IEEE
14 years 1 months ago
The Use of Communications Networks to Increase Personal Privacy
CommunicationsNetworks can separate as well asjoin iMormation. This ability can be used to increase personal privacy in an environment where advances in technology makes it possib...
Nicholas F. Maxemchuk, Steven H. Low