Sciweavers

2421 search results - page 49 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
EURONGI
2005
Springer
14 years 4 months ago
An Afterstates Reinforcement Learning Approach to Optimize Admission Control in Mobile Cellular Networks
We deploy a novel Reinforcement Learning optimization technique based on afterstates learning to determine the gain that can be achieved by incorporating movement prediction inform...
José Manuel Giménez-Guzmán, J...
SMC
2010
IEEE
148views Control Systems» more  SMC 2010»
13 years 9 months ago
A random finite set based detection and tracking using 3D LIDAR in dynamic environments
—In this paper we describe a fully integrated system for detecting and tracking pedestrians in a dynamic urban environment. The system can reliably detect and track pedestrians t...
Bharath Kalyan, K. W. Lee, W. Sardha Wijesoma, D. ...
DATE
2009
IEEE
112views Hardware» more  DATE 2009»
14 years 5 months ago
Algebraic techniques to enhance common sub-expression elimination for polynomial system synthesis
: Common sub-expression elimination (CSE) serves as a useful optimization technique in the synthesis of arithmetic datapaths described at RTL. However, CSE has a limited potential ...
Sivaram Gopalakrishnan, Priyank Kalla
TRIDENTCOM
2005
IEEE
14 years 4 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau