Sciweavers

812 search results - page 90 / 163
» A Complete Guide to the Future
Sort
View
ICAC
2006
IEEE
15 years 3 months ago
Learning Application Models for Utility Resource Planning
Abstract— Shared computing utilities allocate compute, network, and storage resources to competing applications on demand. An awareness of the demands and behaviors of the hosted...
Piyush Shivam, Shivnath Babu, Jeffrey S. Chase
ICRA
2006
IEEE
75views Robotics» more  ICRA 2006»
15 years 3 months ago
Thinning-based Topological Exploration using Position Probability of Topological Nodes
- Exploration is the fundamental task of guiding a robot autonomously during mapping so that it covers the entire environment with its sensors. In the frontier-based exploration, a...
Tae-Bum Kwon, Jae-Bok Song
FDL
2005
IEEE
15 years 3 months ago
Implementation of a SystemC based Environment
Verification and validation are key issues for today's SoC design projects. This paper presents the implementation of a SystemC based environment for transaction-based verifi...
Richard Hoffer, Frank Baszynski
IWPC
2005
IEEE
15 years 3 months ago
Concise and Consistent Naming
Approximately 70% of the source code of a software system consists of identifiers. Hence, the names chosen as identifiers are of paramount importance for the readability of comp...
Florian Deißenböck, Markus Pizka
IMC
2005
ACM
15 years 3 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis