Sciweavers

1486 search results - page 242 / 298
» Firewall Rules Analysis
Sort
View
DATE
2005
IEEE
147views Hardware» more  DATE 2005»
15 years 5 months ago
Buffer Insertion Considering Process Variation
A comprehensive probabilistic methodology is proposed to solve the buffer insertion problem with the consideration of process variations. In contrast to a recent work, we point o...
Jinjun Xiong, King Ho Tam, Lei He
ICRA
2005
IEEE
121views Robotics» more  ICRA 2005»
15 years 5 months ago
Optimal Formations for Cooperative Localization of Mobile Robots
— This paper studies the effects of the geometry of a mobile robot formation on the accuracy of the robots’ localization. The general case of heterogeneous (in terms of sensor ...
Yukikazu S. Hidaka, Anastasios I. Mourikis, Stergi...
ISIPTA
2005
IEEE
168views Mathematics» more  ISIPTA 2005»
15 years 5 months ago
Bayesianism Without Priors, Acts Without Consequences
: A generalization of subjective expected utility is presented in which the primitives are a finite set of states of the world, a finite set of strategies available to the decision...
Robert Nau
QSHINE
2005
IEEE
15 years 5 months ago
Achieving Weighted Fairness between Uplink and Downlink in IEEE 802.11 DCF-Based WLANs
In this paper, we first propose an analytical model of WLANs (Wireless LANs) with an arbitrary backoff distribution and AIFS (Arbitration Inter-Frame Space). From the analysis, we ...
Jiwoong Jeong, Sunghyun Choi, Chong-kwon Kim
SIGIR
2005
ACM
15 years 5 months ago
Web-based acquisition of Japanese katakana variants
This paper describes a method of detecting Japanese Katakana variants from a large corpus. Katakana words, which are mainly used as loanwords, cause problems with information retr...
Takeshi Masuyama, Hiroshi Nakagawa