Sciweavers

24188 search results - page 4806 / 4838
» Computing on Encrypted Data
Sort
View
TON
2008
124views more  TON 2008»
14 years 9 months ago
Designing packet buffers for router linecards
-- Internet routers and Ethernet switches contain packet buffers to hold packets during times of congestion. Packet buffers are at the heart of every packet switch and router, whic...
Sundar Iyer, Ramana Rao Kompella, Nick McKeown
TSMC
2008
137views more  TSMC 2008»
14 years 9 months ago
A Type-2 Self-Organizing Neural Fuzzy System and Its FPGA Implementation
This paper proposes a type-2 self-organizing neural fuzzy system (T2SONFS) and its hardware implementation. The antecedent parts in each T2SONFS fuzzy rule are interval type-2 fuzz...
Chia-Feng Juang, Yu-Wei Tsao
TSMC
2008
116views more  TSMC 2008»
14 years 9 months ago
Fuzzy Techniques for Subjective Workload-Score Modeling Under Uncertainties
This paper deals with the development of a computer model to estimate the subjective workload score of individuals by evaluating their heart-rate (HR) signals. The identification o...
Mohit Kumar, D. Arndt, Steffi Kreuzfeld, Kerstin T...
JPDC
2007
60views more  JPDC 2007»
14 years 9 months ago
The impact of wrong-path memory references in cache-coherent multiprocessor systems
The core of current-generation high-performance multiprocessor systems is out-of-order execution processors with aggressive branch prediction. Despite their relatively high branch...
Resit Sendag, Ayse Yilmazer, Joshua J. Yi, Augustu...
TSP
2008
157views more  TSP 2008»
14 years 9 months ago
A Two-Stage Approach to Estimate the Angles of Arrival and the Angular Spreads of Locally Scattered Sources
We propose a new two-stage approach to estimate the nominal angles of arrival (AoAs) and the angular spreads (ASs) of multiple locally scattered sources using a uniform linear arra...
Mehrez Souden, Sofiène Affes, Jacob Benesty
« Prev « First page 4806 / 4838 Last » Next »