Sciweavers

507 search results - page 79 / 102
» Measurement, Analysis and Modeling of RTOS System Calls Timi...
Sort
View
76
Voted
IAJIT
2010
87views more  IAJIT 2010»
14 years 8 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
74
Voted
DSN
2002
IEEE
15 years 2 months ago
On the Placement of Software Mechanisms for Detection of Data Errors
An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between ...
Martin Hiller, Arshad Jhumka, Neeraj Suri
73
Voted
TIP
2008
121views more  TIP 2008»
14 years 9 months ago
Bistatic Synthetic Aperture Radar Imaging for Arbitrary Flight Trajectories
Abstract--In this paper, we present an analytic, filtered backprojection (FBP) type inversion method for bistatic synthetic aperture radar (BISAR). We consider a BISAR system where...
Can Evren Yarman, Birsen Yazici, Margaret Cheney
CIKM
2011
Springer
13 years 9 months ago
Citation count prediction: learning to estimate future citations for literature
In most of the cases, scientists depend on previous literature which is relevant to their research fields for developing new ideas. However, it is not wise, nor possible, to trac...
Rui Yan, Jie Tang, Xiaobing Liu, Dongdong Shan, Xi...
SIMUTOOLS
2008
14 years 11 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin