Sciweavers

461 search results - page 46 / 93
» Bounds for Validation
Sort
View
SIGCOMM
1996
ACM
14 years 3 months ago
Adaptive Resource Management Algorithms for Indoor Mobile Computing Environments
Emerging indoor mobile computing environments seek to provide a user with an advanced setofcommunication-intensive applications, which require sustained quality of service in the ...
Songwu Lu, Vaduvur Bharghavan
ICDM
2007
IEEE
176views Data Mining» more  ICDM 2007»
14 years 2 months ago
A Compact Representation of Spatio-Temporal Data
As technology advances we encounter more available data on moving objects, which can be mined to our benefit. In order to efficiently mine this large amount of data we propose an ...
Sigal Elnekave, Mark Last, Oded Maimon
CIAC
2006
Springer
103views Algorithms» more  CIAC 2006»
14 years 2 months ago
Provisioning a Virtual Private Network Under the Presence of Non-communicating Groups
Virtual private network design in the hose model deals with the reservation of capacities in a weighted graph such that the terminals in this network can communicate with one anoth...
Friedrich Eisenbrand, Edda Happ
DDECS
2006
IEEE
146views Hardware» more  DDECS 2006»
14 years 2 months ago
Automatic Identification of Timing Anomalies for Cycle-Accurate Worst-Case Execution Time Analysis
Abstract-- Hard real-time systems need methods to determine upper bounds for their execution times, usually called worst-case execution times. Timing anomalies are counterintuitive...
Jochen Eisinger, Ilia Polian, Bernd Becker, Alexan...
RSS
2007
115views Robotics» more  RSS 2007»
14 years 12 days ago
An experimental study of exploiting multipath fading for robot communications
— A simple approach for mobile robots to exploit multipath fading in order to improve received radio signal strength (RSS), is presented. The strategy is to sample the RSS at dis...
Magnus Lindhé, Karl Henrik Johansson, Anton...