Sciweavers

598 search results - page 81 / 120
» Linear Controller Design Limits of Performance
Sort
View
ISCAPDCS
2004
13 years 10 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
BMCBI
2010
87views more  BMCBI 2010»
13 years 8 months ago
poolMC: Smart pooling of mRNA samples in microarray experiments
Background: Typically, pooling of mRNA samples in microarray experiments implies mixing mRNA from several biological-replicate samples before hybridization onto a microarray chip....
Raghunandan M. Kainkaryam, Angela Bruex, Anna C. G...
CONEXT
2009
ACM
13 years 9 months ago
Traffic management and resource allocation in small wired/wireless networks
We consider the problem of traffic management in small networks with both wireless and wired devices, connected to the Internet through a single gateway. Examples of such networks...
Christos Gkantsidis, Thomas Karagiannis, Peter B. ...
ISER
1995
Springer
131views Robotics» more  ISER 1995»
14 years 1 days ago
Stiffness Isn't Everything
Most robot designers make the mechanical interface between an actuator and its load as stiff as possible[9][10]. This makes sense in traditional position-controlled systems, becau...
Gill A. Pratt, Matthew M. Williamson, Peter Dilwor...
DAC
2003
ACM
14 years 9 months ago
Accurate timing analysis by modeling caches, speculation and their interaction
Schedulability analysis of real-time embedded systems requires worst case timing guarantees of embedded software performance. This involves not only language level program analysi...
Xianfeng Li, Tulika Mitra, Abhik Roychoudhury