Sciweavers

1548 search results - page 127 / 310
» Performance evaluation and optimization of human control str...
Sort
View
SIGCOMM
2003
ACM
15 years 9 months ago
A measurement-based analysis of multihoming
Multihoming has traditionally been employed by stub networks to enhance the reliability of their network connectivity. With the advent of commercial “intelligent route controlâ€...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
AUTOMATICA
2005
126views more  AUTOMATICA 2005»
15 years 3 months ago
Relations between uncertainty structures in identification for robust control
Various techniques of system identification exist that provide a nominal model and an uncertainty bound. An important question is what the implications are for the particular choi...
Sippe G. Douma, Paul M. J. Van den Hof
ICPR
2010
IEEE
15 years 7 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
145
Voted
ACMACE
2005
ACM
15 years 9 months ago
SymBall: camera driven table tennis for mobile phones
We present a table tennis game concept, implemented for Symbian OS/Series 60 mobile phones, using the phone's integrated camera as the main game controller. The game demonstr...
Mika Hakkarainen, Charles Woodward
CONEXT
2006
ACM
15 years 10 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford