Sciweavers

3487 search results - page 669 / 698
» The Virtual Design Team
Sort
View
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 4 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
AINA
2007
IEEE
14 years 4 months ago
Power and Delay Analysis of The WEAC Protocol Based MANET Under Video Transport
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Hafiz M. Asif, Tarek R. Sheltami
ROMAN
2007
IEEE
139views Robotics» more  ROMAN 2007»
14 years 4 months ago
Tele-operation of a Mobile Robot Using a Force Reflection Joystick with a Single Hall Sensor
—Though the final goal of mobile robot navigation is to be autonomous, operators’ intelligent and skillful decisions are necessary when there are many scattered obstacles. Ther...
Soonshin Han, JangMyung Lee
SRDS
2007
IEEE
14 years 4 months ago
Customizable Fault Tolerance for Wide-Area Replication
Constructing logical machines out of collections of physical machines is a well-known technique for improving the robustness and fault tolerance of distributed systems. We present...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
WISE
2007
Springer
14 years 4 months ago
On Tree Pattern Query Rewriting Using Views
We study and present our findings on two closely related problems on xpath rewriting using views when both the view and the query are tree patterns involving /,// and []. First, g...
Junhu Wang, Jeffrey Xu Yu, Chengfei Liu