Sciweavers

7134 search results - page 1345 / 1427
» A comparative study of map use
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
Transmit codes and receive filters for pulse compression radar systems
Pulse compression radar systems make use of transmit code sequences and receive filters that are specially designed to achieve good range resolution and target detection capabili...
Petre Stoica, Jian Li, Ming Xue
MICRO
2008
IEEE
208views Hardware» more  MICRO 2008»
14 years 4 months ago
Microarchitecture soft error vulnerability characterization and mitigation under 3D integration technology
— As semiconductor processing techniques continue to scale down, transient faults, also known as soft errors, are increasingly becoming a reliability threat to high-performance m...
Wangyuan Zhang, Tao Li
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 4 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
MSS
2007
IEEE
105views Hardware» more  MSS 2007»
14 years 4 months ago
Quota enforcement for high-performance distributed storage systems
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
NDSS
2007
IEEE
14 years 4 months ago
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their g...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
« Prev « First page 1345 / 1427 Last » Next »