Sciweavers

2168 search results - page 107 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
131
Voted
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 10 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
180
Voted
VTC
2008
IEEE
179views Communications» more  VTC 2008»
15 years 10 months ago
Relay Subset Selection in Wireless Networks Using Partial Decode-and-Forward Transmission
This paper considers the problem of selecting a subset of nodes in a two-hop wireless network to act as relays in aiding the communication between the source-destination pair. Opt...
Caleb K. Lo, Sriram Vishwanath, Robert W. Heath Jr...
120
Voted
ICRA
2007
IEEE
162views Robotics» more  ICRA 2007»
15 years 10 months ago
Using Robust Estimation for Visual Servoing Based on Dynamic Vision
— The aim of this article is to achieve accurate visual servoing tasks when the shape of the object being observed as well as the final image are unknown. More precisely, we wan...
Christophe Collewet, François Chaumette
INFOCOM
1999
IEEE
15 years 8 months ago
Inference of Multicast Routing Trees and Bottleneck Bandwidths Using End-to-end Measurements
Abstract-- The efficacy of end-to-end multicast transport protocols depends critically upon their ability to scale efficiently to a large number of receivers. Several research mult...
Sylvia Ratnasamy, Steven McCanne
SI3D
2009
ACM
15 years 10 months ago
Hair self shadowing and transparency depth ordering using occupancy maps
This paper presents a method for quickly constructing a highquality approximate visibility function for high frequency semitransparent geometry such as hair. We can then reconstru...
Erik Sintorn, Ulf Assarsson