Sciweavers

785 search results - page 75 / 157
» Two remarks on remotality
Sort
View
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 4 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
ICPR
2008
IEEE
14 years 4 months ago
Tracking of persons for video surveillance of unattended environments
This paper describes a visual surveillance system for remote monitoring of unattended environments. For the purpose of efficiently tracking multiple people in the presence of occ...
Suyu Kong, Manas Kamal Bhuyan, Conrad Sanderson, B...
IPPS
2008
IEEE
14 years 4 months ago
Smart proxies in Java RMI with dynamic aspect-oriented programming
Java RMI extends Java with distributed objects whose methods can be called from remote clients. traction is supported using statically-generated proxy objects on the client to hid...
Andrew Stevenson, Steve MacDonald
IROS
2008
IEEE
170views Robotics» more  IROS 2008»
14 years 4 months ago
RoACH: An autonomous 2.4g crawling hexapod robot
— This work presents the design, fabrication, and testing of a novel hexapedal walking millirobot using only two actuators. Fabricated from S2-Glass reinforced composites and fl...
Aaron M. Hoover, Erik Steltz, Ronald S. Fearing
VR
2008
IEEE
127views Virtual Reality» more  VR 2008»
14 years 4 months ago
A Load Simulation and Metrics Framework for Distributed Virtual Reality
We describe a simple load-measure-model method for analyzing the scalability of Distributed Virtual Environments (DVEs). We use a load simulator and three metrics to measure a DVE...
H. Lally Singh, Denis Gracanin, Kresimir Matkovic