Sciweavers

3895 search results - page 733 / 779
» Measuring the effectiveness of ACATS
Sort
View
CODES
2003
IEEE
14 years 3 months ago
A modular simulation framework for architectural exploration of on-chip interconnection networks
Ever increasing complexity and heterogeneity of SoC platforms require diversified on-chip communication schemes beyond the currently omnipresent shared bus architectures. To prev...
Tim Kogel, Malte Doerper, Andreas Wieferink, Raine...
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
14 years 3 months ago
Evaluating Support for Improvisation in Simulated Emergency Scenarios
Technological systems involving hazards are typically managed by experienced personnel guided by wellformulated, pre-determined procedures. These procedures are designed to ensure...
David Mendonça, Giampiero E. G. Beroggi, Wi...
ICRA
2003
IEEE
184views Robotics» more  ICRA 2003»
14 years 3 months ago
Trajectory planning for smooth transition of a biped robot
- This paper presents a third-order spline interpolation based trajectory planning method which is aiming to achieve smooth biped swing leg trajectory by reducing the instant veloc...
Zhe Tang, Changjiu Zhou, Zengqi Sun
SAINT
2003
IEEE
14 years 3 months ago
On Control Parameters Tuning for Active Queue Management Mechanisms using Multivariate Analysis
In recent years, AQM (Active Queue Management) mechanisms, which support the end-to-end congestion control mechanism of TCP by performing congestion control at a router, have been...
Tomoya Eguchi, Hiroyuki Ohsaki, Masayuki Murata
LCTRTS
2010
Springer
14 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul