Sciweavers

922 search results - page 41 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
MSWIM
2009
ACM
15 years 2 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...
VEE
2010
ACM
238views Virtualization» more  VEE 2010»
15 years 3 months ago
Optimizing crash dump in virtualized environments
Crash dump, or core dump is the typical way to save memory image on system crash for future offline debugging and analysis. However, for typical server machines with likely abund...
Yijian Huang, Haibo Chen, Binyu Zang
ICIAR
2010
Springer
15 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 4 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
CDC
2008
IEEE
127views Control Systems» more  CDC 2008»
15 years 4 months ago
Prediction of vertical motions for landing operations of UAVs
— This paper outlines a novel and feasible procedure to predict vertical motions for safe landing of unmanned aerial vehicles (UAVs) during maritime operations. In the presence o...
Xilin Yang, Hemanshu Roy Pota, Matthew Garratt, Va...