Sciweavers

9842 search results - page 1541 / 1969
» Compositional timing analysis
Sort
View
134
Voted
FGCN
2007
IEEE
113views Communications» more  FGCN 2007»
15 years 11 months ago
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme
To keep the evidence that a stored hard disk does not modify its content, the intuitive scheme is to calculate a hash value of the data in all the sectors in a specific order. Ho...
Zoe L. Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu...
GLOBECOM
2007
IEEE
15 years 11 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
15 years 11 months ago
Analog and Hybrid Computation Approaches for Static Power Flow
Analog and hybrid computation methods are areas of continued interest, particularly in specific applications where traditional digital computation techniques cannot achieve the de...
Aaron St. Leger, Chika O. Nwankpa
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 11 months ago
Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Ian Dobson
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
15 years 11 months ago
Interdependent Risk in Interacting Infrastructure Systems
Critical infrastructures display many of the characteristic properties of complex systems. They exhibit infrequent large failures events that often obey a power law distribution i...
Benjamin A. Carreras, David E. Newman, Paul Gradne...
« Prev « First page 1541 / 1969 Last » Next »