Sciweavers

334 search results - page 58 / 67
» Adaptive Security Metrics for Computer Systems
Sort
View
LCPC
2007
Springer
14 years 2 months ago
Using ZBDDs in Points-to Analysis
Binary Decision Diagrams (BDDs) have recently become widely accepted as a space-efficient method of representing relations in points-to analyses. When BDDs are used to represent re...
Ondrej Lhoták, Stephen Curial, José ...
SERA
2007
Springer
14 years 2 months ago
Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
Nalini Vasudevan, Gowri C. Parthasarathy
ATAL
2010
Springer
13 years 9 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan
CN
2006
79views more  CN 2006»
13 years 8 months ago
Explicit rate multicast congestion control
In this article, we propose a new single-rate end-to-end multicast congestion control scheme called Explicit Rate Multicast Congestion Control (ERMCC) based on a new metric, TRAC ...
Jiang Li, Murat Yuksel, Shivkumar Kalyanaraman
JCM
2007
156views more  JCM 2007»
13 years 7 months ago
MIMO Link Layer Transmission Techniques Based on Cross Layer Design
Abstract— In this paper, we propose and evaluate the performance of new link layer frame transmission techniques for MIMO (multiple input multiple output) wireless systems from a...
Wessam Ajib, David Haccoun, Jean-François F...