Sciweavers

5234 search results - page 976 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICRA
2010
IEEE
136views Robotics» more  ICRA 2010»
15 years 17 days ago
Efficient planning under uncertainty for a target-tracking micro-aerial vehicle
A helicopter agent has to plan trajectories to track multiple ground targets from the air. The agent has partial information of each target's pose, and must reason about its u...
Ruijie He, Abraham Bachrach, Nicholas Roy
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 9 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
180
Voted
SENSYS
2006
ACM
15 years 8 months ago
Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms
We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits. In particul...
Nisheeth Shrivastava, Raghuraman Mudumbai, Upamany...
92
Voted
ICNP
2005
IEEE
15 years 8 months ago
Robust Multiclass Signaling Overload Control
We propose multi-class signaling overload control algorithms, for telecommunication switches, that are robust against different input traffic patterns and system upgrades. In ord...
Sneha Kumar Kasera, José Pinheiro, Catherin...
124
Voted
ISLPED
2003
ACM
115views Hardware» more  ISLPED 2003»
15 years 8 months ago
Reducing energy and delay using efficient victim caches
In this paper, we investigate methods for improving the hit rates in the first level of memory hierarchy. Particularly, we propose victim cache structures to reduce the number of ...
Gokhan Memik, Glenn Reinman, William H. Mangione-S...