Sciweavers

1510 search results - page 142 / 302
» Upper Probabilities and Additivity
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
15 years 4 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
LCN
2007
IEEE
15 years 4 months ago
Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows
— Peer-to-peer and mobile networks gained significant attention of both research community and industry. Applying the peer-to-peer paradigm in mobile networks lead to several pr...
Kalman Graffi, Konstantin Pussep, Sebastian Kaune,...
WAIFI
2007
Springer
175views Mathematics» more  WAIFI 2007»
15 years 4 months ago
Attacking the Filter Generator over GF (2 m )
We consider the filter generator over GF(2m ) consisting of a linear feedback shift register of length k that generates a maximal length linear sequence of period 2mk − 1 over G...
Sondre Rønjom, Tor Helleseth
FGR
2006
IEEE
197views Biometrics» more  FGR 2006»
15 years 4 months ago
A Full-Body Gesture Database for Automatic Gesture Recognition
This paper presents a full-body gesture database which contains 2D video data and 3D motion data of 14 normal gestures, 10 abnormal gestures and 30 command gestures for 20 subject...
Bon-Woo Hwang, Sungmin Kim, Seong-Whan Lee
GLOBECOM
2006
IEEE
15 years 4 months ago
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
— We study the downlink coverage of a base station terminal (BST), which has access to a relay node. Continuing a previous study in which the BST is assumed to provide a variable...
Junjik Bae, Randall Berry, Michael L. Honig