Sciweavers

128 search results - page 12 / 26
» Forward Analysis of Depth-Bounded Processes
Sort
View
CSFW
2012
IEEE
11 years 9 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
PIMRC
2010
IEEE
13 years 5 months ago
Radio over telephone lines in femtocell systems
Wireless over Cable (WoC) paradigm is a new technique to enable distributed antennas systems. WoC is based on the relay of radio frequency wireless signals over a cable infrastruct...
Jonathan Gambini, Umberto Spagnolini
JCIT
2010
197views more  JCIT 2010»
13 years 2 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
KBSE
2005
IEEE
14 years 1 months ago
Locating faulty code using failure-inducing chops
Software debugging is the process of locating and correcting faulty code. Prior techniques to locate faulty code either use program analysis techniques such as backward dynamic pr...
Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gup...
ICRA
2006
IEEE
83views Robotics» more  ICRA 2006»
14 years 1 months ago
On the Treatment of Relative-pose Measurements for Mobile Robot Localization
— In this paper, we study the problem of localization using relative-state estimates. It is shown, that when the same exteroceptive sensor measurement is processed for the comput...
Anastasios I. Mourikis, Stergios I. Roumeliotis