Sciweavers

426 search results - page 51 / 86
» Run lengths and liquidity
Sort
View
LATA
2009
Springer
14 years 4 months ago
Counting Parameterized Border Arrays for a Binary Alphabet
The parameterized pattern matching problem is a kind of pattern matching problem, where a pattern is considered to occur in a text when there exists a renaming bijection on the alp...
Tomohiro I, Shunsuke Inenaga, Hideo Bannai, Masayu...
GLVLSI
2009
IEEE
186views VLSI» more  GLVLSI 2009»
14 years 4 months ago
Bitmask-based control word compression for NISC architectures
Implementing a custom hardware is not always feasible due to cost and time considerations. No instruction set computer (NISC) architecture is one of the promising direction to des...
Chetan Murthy, Prabhat Mishra
ICRA
2009
IEEE
108views Robotics» more  ICRA 2009»
14 years 4 months ago
Control of hopping speed and height over unknown rough terrain using a single actuator
— We present a method for controlling the forward speed and the apex height of a one-legged hopping robot over rough terrain, using a single actuator located at the robot hip. Th...
Nicholas Cherouvim, Evangelos Papadopoulos
IEEEIAS
2009
IEEE
14 years 4 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
INFOCOM
2009
IEEE
14 years 4 months ago
MARA: Maximum Alternative Routing Algorithm
—In hop-by-hop networks, provision of multipath routes for all nodes can improve fault tolerance and performance. In this paper we study the multipath route calculation by constr...
Yasuhiro Ohara, Shinji Imahori, Rodney Van Meter