Sciweavers

1215 search results - page 207 / 243
» On modeling, analysis, and optimization of packet aggregatio...
Sort
View
AUTOMATICA
2005
126views more  AUTOMATICA 2005»
14 years 9 months ago
Relations between uncertainty structures in identification for robust control
Various techniques of system identification exist that provide a nominal model and an uncertainty bound. An important question is what the implications are for the particular choi...
Sippe G. Douma, Paul M. J. Van den Hof
CVPR
2003
IEEE
15 years 11 months ago
Using Many Cameras as One
We illustrate how to consider a network of cameras as a single generalized camera in a framework proposed by Nayar [13]. We derive the discrete structure from motion equations for...
Robert Pless
SMC
2007
IEEE
134views Control Systems» more  SMC 2007»
15 years 4 months ago
A Petri net-based approach to QoS-aware configuration for web services
: With the development of enterprise-wide and cross-enterprise application integration and interoperation towards web service, web service providers try to not only fulfill the fun...
PengCheng Xiong, Yushun Fan, MengChu Zhou
RTA
2007
Springer
15 years 3 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
ICPPW
2000
IEEE
15 years 2 months ago
Active Streaming in Transport Delay Minimization
In this paper we present a technique for reducing response delay for web systems, which is based on a proactive cache scheme. It combines predictive pre-fetching and streaming to ...
Javed I. Khan