Sciweavers

235 search results - page 26 / 47
» Using simulation in the implementation of an Outpatient Proc...
Sort
View
PATMOS
2004
Springer
15 years 7 months ago
A Multi-level Validation Methodology for Wireless Network Applications
Abstract. This paper presents the validation methodology established and applied during the development of a wireless LAN application. The target of the development is the implemen...
Christos Drosos, Labros Bisdounis, Dimitris Metafa...
ISCA
2008
IEEE
132views Hardware» more  ISCA 2008»
15 years 8 months ago
Online Estimation of Architectural Vulnerability Factor for Soft Errors
As CMOS technology scales and more transistors are packed on to the same chip, soft error reliability has become an increasingly important design issue for processors. Prior resea...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
JIRS
2006
128views more  JIRS 2006»
15 years 1 months ago
A Modified Particle Filter for Simultaneous Localization and Mapping
The implementation of a particle filter (PF) for vision-based bearing-only simultaneous localization and mapping (SLAM) of a mobile robot in an unstructured indoor environment is p...
N. M. Kwok, A. B. Rad
WSC
2007
15 years 3 months ago
Implications of heavy tails on simulation-based ordinal optimization
We consider the problem of selecting the best system using simulation-based ordinal optimization. This problem has been studied mostly in the context of light-tailed distributions...
Mark Broadie, Minsup Han, Assaf Zeevi
IPPS
2006
IEEE
15 years 7 months ago
Parallel calculation of volcanoes for cryptographic uses
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Nevertheless, since not every elliptic curve is useful for cryptographic purposes, me...
Santi Martínez, R. Tomas, C. Roig, Magda Va...