Sciweavers

2100 search results - page 350 / 420
» Observation Can Be as Effective as Action in Problem Solving
Sort
View
CCR
2004
151views more  CCR 2004»
14 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
INFOCOM
2010
IEEE
14 years 8 months ago
Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...
Lirong Jian, Zheng Yang, Yunhao Liu
PAMI
2010
225views more  PAMI 2010»
14 years 8 months ago
The Biometric Menagerie
The problem of biometric menagerie, first pointed out by Doddington et al. (1998), is one that plagues all biometric systems. They observe that only a handful of clients (enrolle...
Neil Yager, Ted Dunstone
MICRO
2010
IEEE
111views Hardware» more  MICRO 2010»
14 years 4 months ago
Putting Faulty Cores to Work
Since the non-cache parts of a core are less regular, compared to on-chip caches, tolerating manufacturing defects in the processing core is a more challenging problem. Due to the ...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
TSE
2010
230views more  TSE 2010»
14 years 4 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...