Sciweavers

149 search results - page 28 / 30
» Symbolic Modeling and Evaluation of Data Paths
Sort
View
ICCD
2007
IEEE
120views Hardware» more  ICCD 2007»
15 years 6 months ago
Statistical timing analysis using Kernel smoothing
We have developed a new statistical timing analysis approach that does not impose any assumptions on the nature of manufacturing variability and takes into account an arbitrary mo...
Jennifer L. Wong, Azadeh Davoodi, Vishal Khandelwa...
CSE
2009
IEEE
15 years 4 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
IMC
2005
ACM
15 years 3 months ago
Predicting Short-Transfer Latency from TCP Arcana: A Trace-based Validation
In some contexts it may be useful to predict the latency for short TCP transfers. For example, a Web server could automatically tailor its content depending on the network path to...
Martin F. Arlitt, Balachander Krishnamurthy, Jeffr...
IMC
2005
ACM
15 years 3 months ago
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage
Interference has always been considered as an unavoidable peril in wireless networks. A single data transmission is useful to some nodes and becomes interference to others. Based ...
Arunesh Mishra, Eric Rozner, Suman Banerjee, Willi...
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...