Sciweavers

188 search results - page 31 / 38
» Predictable Design of Network-Based Covert Communication Sys...
Sort
View
IJRR
2008
114views more  IJRR 2008»
13 years 7 months ago
Active Electrolocation for Underwater Target Localization
We explore the capabilities of a robotic sensing system designed to locate objects underwater through active movement of an electric field emitter and sensor apparatus. The system ...
James R. Solberg, Kevin M. Lynch, Malcolm A. MacIv...
CASES
2009
ACM
14 years 2 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...
ICS
2009
Tsinghua U.
14 years 4 days ago
A comprehensive power-performance model for NoCs with multi-flit channel buffers
Large Multi-Processor Systems-on-Chip use Networks-on-Chip with a high degree of reusability and scalability for message communication. Therefore, network infrastructure is a cruc...
Mohammad Arjomand, Hamid Sarbazi-Azad
INFOCOM
2011
IEEE
12 years 11 months ago
Describing and forecasting video access patterns
Abstract—Computer systems are increasingly driven by workloads that reflect large-scale social behavior, such as rapid changes in the popularity of media items like videos. Capa...
Gonca Gürsun, Mark Crovella, Ibrahim Matta
CCS
2003
ACM
14 years 23 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves