Sciweavers

3641 search results - page 717 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
AROBOTS
2002
115views more  AROBOTS 2002»
13 years 7 months ago
Statistical Learning for Humanoid Robots
The complexity of the kinematic and dynamic structure of humanoid robots make conventional analytical approaches to control increasingly unsuitable for such systems. Learning techn...
Sethu Vijayakumar, Aaron D'Souza, Tomohiro Shibata...
P2P
2009
IEEE
115views Communications» more  P2P 2009»
14 years 2 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
TRIDENTCOM
2006
IEEE
14 years 1 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
MUM
2005
ACM
164views Multimedia» more  MUM 2005»
14 years 1 months ago
PhoneGuide: museum guidance supported by on-device object recognition on mobile phones
We present PhoneGuide – an enhanced museum guidance approach that uses camera-equipped mobile phones and on-device object recognition. Our main technical achievement is a simple...
Paul Föckler, Thomas Zeidler, Benjamin Bromba...
SPAA
2004
ACM
14 years 1 months ago
Lower bounds for graph embeddings and combinatorial preconditioners
Given a general graph G, a fundamental problem is to find a spanning tree H that best approximates G by some measure. Often this measure is some combination of the congestion and...
Gary L. Miller, Peter C. Richter