Sciweavers

1575 search results - page 202 / 315
» The provenance of electronic data
Sort
View
INFOCOM
2003
IEEE
15 years 5 months ago
Time-Optimal Network Queue Control: The Case of a Single Congested Node
-We solve the problem of time-optimal network queue control: what are the input data rates that make network queue sizes converge to their ideal size in the least possible time aft...
Mahadevan Iyer, Wei Kang Tsai
ITC
2003
IEEE
110views Hardware» more  ITC 2003»
15 years 5 months ago
An extension to JTAG for at-speed debug on a system
When developing new designs, debugging the prototype is important to resolve application malfunction. During this board design debug, often a few pins of an IC are measured to che...
Leon van de Logt, Frank van der Heyden, Tom Waayer...
TRUST
2010
Springer
15 years 4 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
ICRA
2002
IEEE
142views Robotics» more  ICRA 2002»
15 years 4 months ago
Hybrid Simultaneous Localization and Map Building: Closing the Loop with Multi-Hypotheses Tracking
In this paper simultaneous localization and map building is performed with a hybrid, metric - topological, approach. A global topological map connects local metric maps, allowing ...
Nicola Tomatis, Illah R. Nourbakhsh, Roland Siegwa...
LCN
2002
IEEE
15 years 4 months ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung