Sciweavers

5234 search results - page 738 / 1047
» Simulation of Computer Network Attacks
Sort
View
CCECE
2006
IEEE
15 years 11 months ago
Adaptive Bilateral Control using Operator Elbow Impedance
— Human arm dynamics can be used for control of human-machine interfaces in haptic applications. In this paper, a novel method for online estimation of human operator elbow imped...
Farid Mobasser, Keyvan Hashtrudi-Zaad
DSN
2006
IEEE
15 years 11 months ago
Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms
We present three algorithms for detecting the need for software rejuvenation by monitoring the changing values of a customer-affecting performance metric, such as response time. A...
Alberto Avritzer, Andre B. Bondi, Michael Grottke,...
133
Voted
DSN
2006
IEEE
15 years 11 months ago
The Startup Problem in Fault-Tolerant Time-Triggered Communication
Fault-tolerant time-triggered communication relies on the synchronization of local clocks. The startup problem is the problem of reaching a sufficient degree of synchronization a...
Wilfried Steiner, Hermann Kopetz
LCN
2006
IEEE
15 years 11 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...
AINA
2005
IEEE
15 years 10 months ago
3D-VOQ Switch Design and Evaluation
Input Buffered Switches with Virtual Output Queues(VOQ) design to avoid Head-Of-Line problems, is a primary design of switches that can be scalable to very high speeds. However, t...
Ding-Jyh Tsaur, Xian-Yang Lu, Chin-Chi Wu, Woei Li...