Sciweavers

461 search results - page 71 / 93
» Bounds for Validation
Sort
View
CN
2007
111views more  CN 2007»
14 years 9 months ago
Quantile sampling for practical delay monitoring in Internet backbone networks
Point-to-point delay is an important network performance measure as it captures service degradations caused by various events. We study how to measure and report delay in a concis...
Baek-Young Choi, Sue B. Moon, Rene L. Cruz, Zhi-Li...
JFR
2008
148views more  JFR 2008»
14 years 9 months ago
Terrain-based vehicle orientation estimation combining vision and inertial measurements
A novel method for estimating vehicle roll, pitch and yaw using machine vision and inertial sensors is presented that is based on matching images captured from an on-vehicle camer...
Vishisht Gupta, Sean Brennan
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 9 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
SAC
2006
ACM
14 years 9 months ago
Assisted verification of elementary functions using Gappa
The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall er...
Florent de Dinechin, Christoph Quirin Lauter, Guil...
TKDE
2008
169views more  TKDE 2008»
14 years 9 months ago
A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
Data stream management systems need to control their resources adaptively since stream characteristics and query workload may vary over time. In this paper we investigate an approa...
Michael Cammert, Jürgen Krämer, Bernhard...