Sciweavers

12050 search results - page 2231 / 2410
» Modeling and Simulation
Sort
View
IDEAL
2010
Springer
15 years 1 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
INFOCOM
2010
IEEE
15 years 1 months ago
Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline Constraints
Multimedia streaming applications have stringent QoS requirements. Typically each packet is associated with a packet delivery deadline. This work models and considers realtime stre...
Xiaohang Li, Chih-Chun Wang, Xiaojun Lin
INFOCOM
2010
IEEE
15 years 1 months ago
Chorus: Collision Resolution for Efficient Wireless Broadcast
Traditional wireless broadcast protocols rely heavily on the 802.11-based CSMA/CA model, which avoids interference and collision by conservatively scheduling transmissions. While C...
Xinyu Zhang, Kang G. Shin
INFOCOM
2010
IEEE
15 years 1 months ago
Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels
We develop a general approach for designing scheduling policies for real-time traffic over wireless channels. We extend prior work, which characterizes a real-time flow by its traf...
I-Hong Hou, P. R. Kumar
IPPS
2010
IEEE
15 years 1 months ago
A GPU-inspired soft processor for high-throughput acceleration
There is building interest in using FPGAs as accelerators for high-performance computing, but existing systems for programming them are so far inadequate. In this paper we propose...
Jeffrey Kingyens, J. Gregory Steffan
« Prev « First page 2231 / 2410 Last » Next »