Sciweavers

1690 search results - page 123 / 338
» Applications of Metric Coinduction
Sort
View
INFOCOM
2008
IEEE
15 years 6 months ago
Minerva: Learning to Infer Network Path Properties
—Knowledge of the network path properties such as latency, hop count, loss and bandwidth is key to the performance of overlay networks, grids and p2p applications. Network operat...
Rita H. Wouhaybi, Puneet Sharma, Sujata Banerjee, ...
WCNC
2008
IEEE
15 years 6 months ago
ECHO: A Quality of Service Based Endpoint Centric Handover Scheme for VoIP
– Existing terminal oriented handover mechanisms capable of meeting the strict delay bounds of real time applications such as VoIP do not consider the QoS of candidate handover n...
John Fitzpatrick, Seán Murphy, Mohammed Ati...
91
Voted
IWPSE
2007
IEEE
15 years 6 months ago
Visual identification of software evolution patterns
Software evolution plays a key role in the overall lifecycle of a software system. In this phase, software developers extend the capabilities and functionality of the system to me...
Andrejs Jermakovics, Marco Scotto, Giancarlo Succi
DRM
2007
Springer
15 years 6 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
CODES
2006
IEEE
15 years 5 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst