Sciweavers

3073 search results - page 557 / 615
» Real World Verification
Sort
View
ACSC
2006
IEEE
14 years 2 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
AINA
2006
IEEE
14 years 2 months ago
V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm Benchmark
Most conventional IPv4-based route lookup algorithms are no more suitable for IPv6 packet forwarding due to the significantly increased 128-bit-long address. However, as a result o...
Kai Zheng, Bin Liu
GLOBECOM
2006
IEEE
14 years 2 months ago
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in Wireless Sensor Networks
— Coverage is an important issue related to WSN quality of service. Several centralized/decentralized solutions based on the geometry information of sensors and under the assumpt...
Azzedine Boukerche, Xin Fei, Regina Borges de Arau...
IROS
2006
IEEE
151views Robotics» more  IROS 2006»
14 years 2 months ago
Robust Feature Correspondences for Vision-Based Navigation with Slow Frame-Rate Cameras
— We propose a vision-based inertial system that overcomes the problems associated with slow update rates in navigation systems based on high-resolution cameras. Due to bandwidth...
Darius Burschka
IROS
2006
IEEE
147views Robotics» more  IROS 2006»
14 years 2 months ago
Opportunistic Use of Vision to Push Back the Path-Planning Horizon
Abstract— Mobile robots need maps or other forms of geometric information about the environment to navigate. The mobility sensors (LADAR, stereo, etc.) on these robotic vehicles ...
Bart C. Nabbe, Derek Hoiem, Alexei A. Efros, Marti...