Sciweavers

1737 search results - page 61 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
OOPSLA
2004
Springer
14 years 2 months ago
Finding your cronies: static analysis for dynamic object colocation
This paper introduces dynamic object colocation, an optimization to reduce copying costs in generational and other incremental garbage collectors by allocating connected objects t...
Samuel Z. Guyer, Kathryn S. McKinley
INFOCOM
2006
IEEE
14 years 3 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
ICRA
1994
IEEE
147views Robotics» more  ICRA 1994»
14 years 1 months ago
Provable Strategies for Vision-Guided Exploration in Three Dimensions
An approach is presented for exploring an unknown, arbitrary surface in three-dimensional (3D) space by a mobile robot. The main contributions are (1) an analysis of the capabilit...
Kiriakos N. Kutulakos, Charles R. Dyer, Vladimir J...
VRCAI
2009
ACM
14 years 3 months ago
Segmentation of architecture shape information from 3D point cloud
Object Segmentation is an important step in object reconstruction from point cloud data of complex urban scenes and in applications to virtual environment. This paper focuses on s...
Xiaojuan Ning, Xiaopeng Zhang, Yinghui Wang, Marc ...
ICC
2007
IEEE
166views Communications» more  ICC 2007»
14 years 3 months ago
Dynamic Optimization of Secure Mobile Sensor Networks: A Genetic Algorithm
— We propose a reduced-complexity genetic algorithm for secure and dynamic deployment of resource constrained multi-hop mobile sensor networks. Mobility and security are relative...
Rahul Khanna, Huaping Liu, Hsiao-Hwa Chen