Sciweavers

1512 search results - page 290 / 303
» Principles of IEEE 802.11s
Sort
View
PRDC
2002
IEEE
14 years 12 days ago
Caveat Emptor: Making Grid Services Dependable from the Client Side
Grid computing relies on fragile partnerships. Clients with hundreds or even thousands of pending service requests must seek out and form temporary alliances with remote servers e...
Miron Livny, Douglas Thain
SSIAI
2002
IEEE
14 years 12 days ago
Active Contours for Cell Tracking
This paper introduces an active contour or snakebased method for tracking cells within a video sequence. Specifically, we apply our cell tracking techniques to rolling leukocytes ...
Nilanjan Ray, Scott T. Acton
CDC
2009
IEEE
134views Control Systems» more  CDC 2009»
14 years 6 days ago
Event-based control using quadratic approximate value functions
Abstract— In this paper we consider several problems involving control with limited actuation and sampling rates. Event-based control has emerged as an attractive approach for ad...
Randy Cogill
ACSAC
2000
IEEE
13 years 12 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
BMAS
2000
IEEE
13 years 12 months ago
Verilog-AMS: Mixed-Signal Simulation and Cross Domain Connect Modules
Verilog-AMS is one of the major mixed-signal hardware description languages on today’s market. In addition to the extended capabilities to model analog and digital behavior, the...
Peter Frey, Donald O'Riordan