Sciweavers

1534 search results - page 287 / 307
» Error Reporting Logic
Sort
View
CCS
2007
ACM
14 years 4 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
SMALLTALK
2007
Springer
14 years 3 months ago
Transactional memory for smalltalk
Concurrency control in Smalltalk is based on locks and is therefore notoriously difficult to use. Even though some implementations provide high-level constructs, these add complexi...
Lukas Renggli, Oscar Nierstrasz
ISPASS
2006
IEEE
14 years 3 months ago
Simulation sampling with live-points
Current simulation-sampling techniques construct accurate model state for each measurement by continuously warming large microarchitectural structures (e.g., caches and the branch...
Thomas F. Wenisch, Roland E. Wunderlich, Babak Fal...
SENSYS
2006
ACM
14 years 3 months ago
Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms
We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits. In particul...
Nisheeth Shrivastava, Raghuraman Mudumbai, Upamany...
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
14 years 3 months ago
Robust Adaptive Control of Automatic Guidance of Farm Vehicles in the Presence of Sliding
— High-precision autofarming is rapidly becoming a reality with the requirements of agricultural applications. Lots of research works have been focused on the automatic guidance ...
Hao Fang, Roland Lenain, Benoit Thuilot, Philippe ...