Sciweavers

2030 search results - page 388 / 406
» The Need for Customizable Operating Systems
Sort
View
ICC
2008
IEEE
158views Communications» more  ICC 2008»
14 years 2 months ago
Improving WSN Simulation and Analysis Accuracy Using Two-Tier Channel Models
— Accurate simulation and analysis of wireless protocols and systems is inherently dependent on an accurate model of the underlying channel. In this paper, we show that residual ...
Adnan Iqbal, Syed Ali Khayam
ICCV
2007
IEEE
14 years 1 months ago
Dense Multiscale Motion Extraction from Cardiac Cine MR Tagging using HARP Technology
We propose an operational method to extract the left ventricle (LV) systole dynamics using HARmonic Phase (HARP) images extracted from tagged cardiac MR sequences. Established tec...
Luc Florack, Hans C. van Assen, Avan Suinesiaputra
ICNP
2007
IEEE
14 years 1 months ago
Adaptive Optimization of Rate Adaptation Algorithms in Multi-Rate WLANs
— Rate adaptation is one of the basic functionalities in today’s 802.11 wireless LANs (WLANs). Although it is primarily designed to cope with the variability of wireless channe...
Jaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon...
ICRA
2007
IEEE
155views Robotics» more  ICRA 2007»
14 years 1 months ago
Dogged Learning for Robots
— Ubiquitous robots need the ability to adapt their behaviour to the changing situations and demands they will encounter during their lifetimes. In particular, non-technical user...
Daniel H. Grollman, Odest Chadwicke Jenkins
CCS
2007
ACM
14 years 1 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...