Sciweavers

184 search results - page 35 / 37
» Fairness in Wallets with Observer
Sort
View
CASES
2007
ACM
15 years 1 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
PERCOM
2010
ACM
15 years 1 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...
COMPSAC
2004
IEEE
15 years 1 months ago
Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags
Software reliability is defined as the probability of failure-free software operation for a specified period of time in a specified environment. Over the past 30 years, many softw...
Chin-Yu Huang, Chu-Ti Lin, Sy-Yen Kuo, Michael R. ...
AUSAI
2006
Springer
15 years 1 months ago
Robust Character Recognition Using a Hierarchical Bayesian Network
There is increasing evidence to suggest that the neocortex of the mammalian brain does not consist of a collection of specialised and dedicated cortical architectures, but instead ...
John Thornton, Torbjorn Gustafsson, Michael Blumen...
ICNP
1997
IEEE
15 years 1 months ago
On path selection for traffic with bandwidth guarantees
Transmission ofmultimedia streams imposesa minimum-bandwidth requirementon the path being usedto ensureend-to-endQuality-ofService (QoS) guarantees. While any shortest-path algori...
Qingming Ma, Peter Steenkiste