Sciweavers

5333 search results - page 224 / 1067
» Optimizing Computer System Configurations
Sort
View
IJFCS
2008
158views more  IJFCS 2008»
15 years 3 months ago
An Alternative Construction in Symbolic Reachability Analysis of Second Order Pushdown Systems
Abstract. Recently, it has been shown that for any higher order pushdown system H and for any regular set C of configurations, the set pre H(C), is regular. In this paper, we give ...
Anil Seth
118
Voted
JCIT
2008
138views more  JCIT 2008»
15 years 3 months ago
Real Time Automated Fabric Defect Detection System using Microcontroller
In a Least Developed Country (LDC) like Bangladesh where the textile is the main core of our economy; still there is a major drawback in this sector which is the defect detection ...
Tamnun E. Mursalin, Fajrana Zebin Eishita, Ahmed R...
ACSAC
2010
IEEE
15 years 1 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
112
Voted
TROB
2002
118views more  TROB 2002»
15 years 3 months ago
The odometry error of a mobile robot with a synchronous drive system
This paper presents an error modeling of an odometry system for a synchronous-drive system and a possible strategy for evaluating this error. The odometry error is modeled by intro...
Agostino Martinelli

Publication
453views
17 years 1 months ago
System Level Modeling of IEEE 802.16e Mobile WiMAX Networks: Key Issues
WiMAX has attracted a lot of attention recently in the telecommunication community including researchers, product developers and service providers. Numerous papers have been publis...
Raj Jain, Chakchai So-In, and Abdel-Karim Al Tamim...