Sciweavers

17789 search results - page 3400 / 3558
» Exceptional Use Cases
Sort
View
187
Voted
VTC
2006
IEEE
199views Communications» more  VTC 2006»
15 years 10 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
ACNS
2006
Springer
79views Cryptology» more  ACNS 2006»
15 years 10 months ago
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
Abstract. In this paper, we present the rainbow attack on stream ciphers filtered by Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-da...
Khoongming Khoo, Guang Gong, Hian-Kiat Lee
ASPLOS
2006
ACM
15 years 10 months ago
Ultra low-cost defect protection for microprocessor pipelines
The sustained push toward smaller and smaller technology sizes has reached a point where device reliability has moved to the forefront of concerns for next-generation designs. Sil...
Smitha Shyam, Kypros Constantinides, Sujay Phadke,...
COMPGEOM
2006
ACM
15 years 10 months ago
Minimum-cost coverage of point sets by disks
We consider a class of geometric facility location problems in which the goal is to determine a set X of disks given by their centers (tj) and radii (rj) that cover a given set of...
Helmut Alt, Esther M. Arkin, Hervé Brö...
HRI
2006
ACM
15 years 10 months ago
Effects of head movement on perceptions of humanoid robot behavior
This paper examines human perceptions of humanoid robot behavior, specifically how perception is affected by variations in head tracking behavior under constant gestural behavior....
Emily Wang, Constantine Lignos, Ashish Vatsal, Bri...
« Prev « First page 3400 / 3558 Last » Next »