Sciweavers

4820 search results - page 869 / 964
» Implementing Signatures for C
Sort
View
ICRA
2006
IEEE
123views Robotics» more  ICRA 2006»
15 years 8 months ago
Simultaneous Localization and Mapping with Environmental Structure Prediction
—Traditionally, simultaneous localization and mapping (SLAM) algorithms solve the localization and mapping problem in explored regions. This paper presents a prediction-based SLA...
H. Jacky Chang, C. S. George Lee, Yung-Hsiang Lu, ...
INFOCOM
2006
IEEE
15 years 8 months ago
Accelerating Simulation of Large-Scale IP Networks: A Network Invariant Preserving Approach
— In this paper, we propose a simulation framework, TranSim, that reduces the rate at which packet-events are generated, in order to accelerate large-scale simulation of IP netwo...
Hwangnam Kim, Hyuk Lim, Jennifer C. Hou
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
15 years 8 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
SIPS
2006
IEEE
15 years 8 months ago
Automated Architectural Exploration for Signal Processing Algorithms
Abstract— This paper presents a design environment for efficiently generating application-specific Intellectual Property (IP) cores for system level signal processing algorithm...
Ramsey Hourani, Ravi Jenkal, W. Rhett Davis, Winse...
ASPLOS
2006
ACM
15 years 8 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou