Sciweavers

115 search results - page 22 / 23
» An Error Control Scheme for Large-Scale Multicast Applicatio...
Sort
View
DAC
2007
ACM
14 years 6 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
CCR
2004
91views more  CCR 2004»
13 years 5 months ago
New techniques for making transport protocols robust to corruption-based loss
Current congestion control algorithms treat packet loss as an indication of network congestion, under the assumption that most losses are caused by router queues overflowing. In r...
Wesley M. Eddy, Shawn Ostermann, Mark Allman
SIGCOMM
2006
ACM
13 years 11 months ago
Beyond bloom filters: from approximate membership checks to approximate state machines
Many networking applications require fast state lookups in a concurrent state machine, which tracks the state of a large number of flows simultaneously. We consider the question ...
Flavio Bonomi, Michael Mitzenmacher, Rina Panigrah...
ISBI
2004
IEEE
14 years 6 months ago
Statistical Surface-Based Morphometry Using a Non-Parametric Approach
We present a novel method of statistical surface-based morphometry based on the use of non-parametric permutation tests. In order to evaluate morphologicaldifferences of brain str...
Dimitrios Pantazis, Richard M. Leahy, Thomas E. Ni...
GLOBECOM
2009
IEEE
14 years 2 hour ago
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can
—802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show ...
Kevin S. Bauer, Damon McCoy, Eric W. Anderson, Mar...