Sciweavers

1080 search results - page 112 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
NETWORKING
2004
14 years 11 months ago
Experimental Analysis of the SABUL Congestion Control Algorithm
Several new protocols such as RBUDP, User-Level UDP, Tsunami, and SABUL, have been proposed as alternatives to TCP for high speed data transfer. The purpose of this paper is to an...
Phoemphun Oothongsap, Yannis A. Viniotis, Mladen A...
PSTV
1992
113views Hardware» more  PSTV 1992»
14 years 11 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
ICFEM
2010
Springer
14 years 8 months ago
A Methodology for Automatic Diagnosability Analysis
We present an algorithm based on temporal-epistemic model checking combined with fault injection to analyse automatically the diagnosability of faults by agents in the system. We d...
Jonathan Ezekiel, Alessio Lomuscio
CODES
1998
IEEE
15 years 2 months ago
Software timing analysis using HW/SW cosimulation and instruction set simulator
Timing analysis for checking satisfaction of constraints is a crucial problem in real-time system design. In some current approaches, the delay of software modules is precalculate...
Jie Liu, Marcello Lajolo, Alberto L. Sangiovanni-V...
ICASSP
2011
IEEE
14 years 1 months ago
Robust talking face video verification using joint factor analysis and sparse representation on GMM mean shifted supervectors
It has been previously demonstrated that systems based on block wise local features and Gaussian mixture models (GMM) are suitable for video based talking face verification due t...
Ming Li, Shrikanth Narayanan