Sciweavers

6931 search results - page 1335 / 1387
» Visual Simulation Environment
Sort
View
QEST
2008
IEEE
14 years 3 months ago
Characterization of the E-commerce Storage Subsystem Workload
This paper characterizes the workload seen at the storage subsystem of an e-commerce system. Measurements are conducted on multi-tiered systems running three different benchmarks,...
Xi Zhang, Alma Riska, Erik Riedel
RTSS
2008
IEEE
14 years 3 months ago
Merge-by-Wire: Algorithms and System Support
Automakers are trying to make vehicles more intelligent and safe by embedding processors which can be used to implement by-wire applications for taking smart decisions on the road...
Vipul Shingde, Gurulingesh Raravi, Ashish Gudhe, P...
VTC
2008
IEEE
137views Communications» more  VTC 2008»
14 years 3 months ago
A Multi-Hop Polling Service with Bandwidth Request Aggregation in IEEE 802.16j Networks
— The IEEE 802.16j protocol for a multi-hop relay (MMR) WiMAX network is being developed to increase data rates and extend service coverage as an enhancement of existing WiMAX st...
Chun Nie, Thanasis Korakis, Shivendra S. Panwar
3DIM
2007
IEEE
14 years 3 months ago
Robust 2D-3D alignment based on geometrical consistency
This paper presents a new registration algorithm of a 2D image and a 3D geometrical model, which is robust for initial registration errors, for reconstructing a realistic 3D model...
Kenji Hara, Yuuki Kabashima, Yumi Iwashita, Ryo Ku...
ACSAC
2007
IEEE
14 years 3 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
« Prev « First page 1335 / 1387 Last » Next »