Sciweavers

4761 search results - page 919 / 953
» Generalizing Boundary Points
Sort
View
CCR
2008
109views more  CCR 2008»
13 years 9 months ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...
CCR
2008
101views more  CCR 2008»
13 years 9 months ago
Empirical evaluation of hash functions for multipoint measurements
A broad spectrum of network measurement applications demand passive multipoint measurements in which data from multiple observation points has to be correlated. Examples are the p...
Christian Henke, Carsten Schmoll, Tanja Zseby
CL
2008
Springer
13 years 9 months ago
Efficient exception handling in Java bytecode-to-C ahead-of-time compiler for embedded systems
One of the most promising approaches to Java acceleration in embedded systems is a bytecode-to-C ahead-of-time compiler (AOTC). It improves the performance of a Java virtual machi...
Dong-Heon Jung, Jong Kuk Park, Sung-Hwan Bae, Jaem...
CN
2008
117views more  CN 2008»
13 years 9 months ago
Packet-switched network selection with the highest QoS in 4G networks
The evolution of telecommunications during the last decades has been enormous and as a result, nowadays, people find themselves before the challenge of 4G networks. Due to the fac...
Dimitris E. Charilas, Ourania I. Markaki, Dimitris...
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 9 months ago
The MUSIC Algorithm for Sparse Objects: A Compressed Sensing Analysis
The MUSIC algorithm, and its extension for imaging sparse extended objects, with noisy data is analyzed by compressed sensing (CS) techniques. A thresholding rule is developed to a...
Albert Fannjiang