Sciweavers

558 search results - page 50 / 112
» Safe and Effective Determinant Evaluation
Sort
View
AICCSA
2006
IEEE
128views Hardware» more  AICCSA 2006»
15 years 6 months ago
Avoiding Denial of Service via Stress Testing
Stress-testing has been widely used by businesses, governments, and other organizations to evaluate the strength of their web applications against various attacks. However, the qu...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
DATE
2006
IEEE
90views Hardware» more  DATE 2006»
15 years 5 months ago
Microarchitectural floorplanning under performance and thermal tradeoff
— In this paper, we present the first multi-objective microarchitectural floorplanning algorithm for designing highperformance, high-reliability processors in the early design ...
Michael B. Healy, Mario Vittes, Mongkol Ekpanyapon...
GLOBECOM
2006
IEEE
15 years 5 months ago
Improving Voice and Data Service Provisioning in Cellular/WLAN Integrated Networks by Admission Control
— In this paper, we study the voice and data service provisioning in an integrated system of cellular and wireless local area networks (WLANs). To maximize the overall resource u...
Wei Song, Yu Cheng, Weihua Zhuang, Aladdin Saleh
ISCAS
2006
IEEE
103views Hardware» more  ISCAS 2006»
15 years 5 months ago
A neural model for sonar-based navigation in obstacle fields
— The rapid control of sonar-guided vehicles through obstacle fields has been a goal of robotics for decades. How sensory data is represented strongly affects how obstacles and g...
Timothy K. Horiuchi
QEST
2006
IEEE
15 years 5 months ago
Bound-Preserving Composition for Markov Reward Models
Stochastic orders can be applied to Markov reward models and used to aggregate models, while introducing a bounded error. Aggregation reduces the number of states in a model, miti...
David Daly, Peter Buchholz, William H. Sanders