Sciweavers

23201 search results - page 4615 / 4641
» Rewriting Systems with Data
Sort
View
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ICRA
2010
IEEE
170views Robotics» more  ICRA 2010»
13 years 6 months ago
Robust vehicle localization in urban environments using probabilistic maps
— Autonomous vehicle navigation in dynamic urban environments requires localization accuracy exceeding that available from GPS-based inertial guidance systems. We have shown prev...
Jesse Levinson, Sebastian Thrun
ICRA
2010
IEEE
159views Robotics» more  ICRA 2010»
13 years 6 months ago
Navigation and control of the Nereus hybrid underwater vehicle for global ocean science to 10, 903 m depth: Preliminary results
— This paper reports an overview of the navigation and control system design for the new Nereus hybrid underwater robotic vehicle (HROV). Vehicle performance during its first se...
Louis L. Whitcomb, Michael V. Jakuba, James C. Kin...
IJBRA
2010
134views more  IJBRA 2010»
13 years 6 months ago
Deterministic graph-theoretic algorithm for detecting modules in biological interaction networks
—Accumulating evidence suggests that biological systems exhibit modular organization. Accurate identification of modularity is vital for understanding this organization. A recen...
Roger L. Chang, Feng Luo, Stuart Johnson, Richard ...
INFOCOM
2010
IEEE
13 years 6 months ago
Maximizing the Contact Opportunity for Vehicular Internet Access
Abstract—With increasing popularity of media enabled handhelds, the need for high data-rate services for mobile users is evident. Large-scale Wireless LANs (WLANs) can provide su...
Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kum...
« Prev « First page 4615 / 4641 Last » Next »