Sciweavers

14670 search results - page 2803 / 2934
» The Systems Modeling Language for Products and Systems Devel...
Sort
View
ICTAI
2008
IEEE
14 years 2 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
IPPS
2008
IEEE
14 years 2 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
14 years 2 months ago
Robots at home: Understanding long-term human-robot interaction
— Human-robot interaction (HRI) is now well enough understood to allow us to build useful systems that can function outside of the laboratory. We are studying longterm interactio...
Cory D. Kidd, Cynthia Breazeal
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 2 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
SECON
2008
IEEE
14 years 2 months ago
Analytical Study of Collaborative Information Coverage for Object Detection in Sensor Networks
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...
Guanqun Yang, Vinod Shukla, Daji Qiao
« Prev « First page 2803 / 2934 Last » Next »