Sciweavers

797 search results - page 120 / 160
» Timed Control with Partial Observability
Sort
View
WICON
2008
13 years 11 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
CASCON
1996
120views Education» more  CASCON 1996»
13 years 11 months ago
Communication costs in code and design reviews: an empirical study
Software development managers strive to control all of the factors that might impact the success of their projects. However, not all of these factors have been identified, much le...
Carolyn B. Seaman
SSS
2010
Springer
125views Control Systems» more  SSS 2010»
13 years 7 months ago
Systematic Correct Construction of Self-stabilizing Systems: A Case Study
Design and implementation of distributed algorithms often involve many subtleties due to their complex structure, non-determinism, and low atomicity as well as occurrence of unanti...
Ananda Basu, Borzoo Bonakdarpour, Marius Bozga, Jo...
TROB
2010
120views more  TROB 2010»
13 years 4 months ago
2-D Ultrasound Probe Complete Guidance by Visual Servoing Using Image Moments
This paper presents a visual-servoing method that is based on 2-D ultrasound (US) images. The main goal is to guide a robot actuating a 2-D US probe in order to reach a desired cro...
Rafik Mebarki, Alexandre Krupa, François Ch...
IEEESP
2011
13 years 1 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...