Sciweavers

309 search results - page 54 / 62
» Robust Recovery of Ego-Motion
Sort
View
NDSS
2003
IEEE
14 years 1 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
NOMS
2002
IEEE
139views Communications» more  NOMS 2002»
14 years 21 days ago
Active connection management in Internet services
We propose a new connection management architecture for clustered Internet services called Active Connection Management (ACM) to improve the availability, quality of service, and ...
Mike Y. Chen, Eric A. Brewer
INFOCOM
1999
IEEE
14 years 2 days ago
Inference of Multicast Routing Trees and Bottleneck Bandwidths Using End-to-end Measurements
Abstract-- The efficacy of end-to-end multicast transport protocols depends critically upon their ability to scale efficiently to a large number of receivers. Several research mult...
Sylvia Ratnasamy, Steven McCanne
CAIP
1999
Springer
140views Image Analysis» more  CAIP 1999»
14 years 2 days ago
Complex Analysis for Reconstruction from Controlled Motion
We address the problem of control-based recovery of robot pose and the environmental lay-out. Panoramic sensors provide us with a 1D projection of characteristic features of a 2D ...
R. Andrew Hicks, David Pettey, Konstantinos Daniil...
AOSD
2007
ACM
13 years 11 months ago
An aspect for idiom-based exception handling: (using local continuation join points, join point properties, annotations and type
The last couple of years, various idioms used in the 15 MLOC C code base of ASML, the world's biggest lithography machine manufacturer, have been unmasked as crosscutting con...
Bram Adams, Kris De Schutter