Sciweavers

2354 search results - page 415 / 471
» Randomness, Stochasticity and Approximations
Sort
View
DATE
2005
IEEE
129views Hardware» more  DATE 2005»
14 years 3 months ago
Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling
A novel energy reduction strategy to maximally exploit the dynamic workload variation is proposed for the offline voltage scheduling of preemptive systems. The idea is to construc...
Lap-Fai Leung, Chi-Ying Tsui, Xiaobo Sharon Hu
EUROMICRO
2005
IEEE
14 years 3 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
ICAS
2005
IEEE
90views Robotics» more  ICAS 2005»
14 years 3 months ago
A TCP-Friendly Stateless AQM Scheme for Fair Bandwidth Allocation
Queue management, bandwidth share, and congestion control are very important to both robustness and fairness of the Internet. In this article, we investigate the problem of provid...
Cheng-Yuan Hoa, Yi-Cheng Chan, Yaw-Chung Chen
ICCV
2005
IEEE
14 years 3 months ago
KALMANSAC: Robust Filtering by Consensus
We propose an algorithm to perform causal inference of the state of a dynamical model when the measurements are corrupted by outliers. While the optimal (maximumlikelihood) soluti...
Andrea Vedaldi, Hailin Jin, Paolo Favaro, Stefano ...
ICPADS
2005
IEEE
14 years 3 months ago
On the Connectedness of Peer-to-Peer Overlay Networks
Peer-to-Peer (P2P) applications typically use overlay networks to forward the content queries. However, due to the distributed fashion of the overlay establishment, the overlay ne...
Weisheng Si, MingChu Li