Sciweavers

250 search results - page 19 / 50
» Verifying Tolerant Systems Using Polynomial Approximations
Sort
View
SOSP
2007
ACM
15 years 6 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
VTC
2006
IEEE
124views Communications» more  VTC 2006»
15 years 3 months ago
Accurate BER Analysis of QPSK Modulated Asynchronous DS-CDMA Systems Communicating over Rayleigh Channels
Abstract— The accurate average BER calculation of an asynchronous DS-CDMA system using random spreading sequences is studied in Rayleigh fading channels. An accurate closedform e...
Xiang Liu, Lajos Hanzo
ICRA
2009
IEEE
117views Robotics» more  ICRA 2009»
15 years 4 months ago
Safe robot arm with safe joint mechanism using nonlinear spring system for collision safety
—Collision safety between humans and robots has drawn much attention since service robots are increasingly being used in human environments. A safe robot arm based on passive com...
Jung-Jun Park, Hwi-Su Kim, Jae-Bok Song
77
Voted
CVPR
2003
IEEE
15 years 11 months ago
A Novel Model for Orientation Field of Fingerprints
As a global feature of fingerprint, orientation field is very important to automatic fingerprint identification system (AFIS). Establishing an accurate and concise model for orien...
Jinwei Gu, Jie Zhou
ESWS
2009
Springer
15 years 4 months ago
Ranking Approximate Answers to Semantic Web Queries
We consider the problem of a user querying semistructured data such as RDF without knowing its structure. In these circumstances, it is helpful if the querying system can perform a...
Carlos A. Hurtado, Alexandra Poulovassilis, Peter ...