Sciweavers

526 search results - page 104 / 106
» Stochastic Controllability of Linear Systems With State Dela...
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
ANCS
2007
ACM
14 years 18 days ago
An improved algorithm to accelerate regular expression evaluation
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
Michela Becchi, Patrick Crowley
PERCOM
2007
ACM
14 years 8 months ago
Data Quality and Query Cost in Wireless Sensor Networks
This research is motivated by emerging, real-world wireless sensor network applications for monitoring and control. We examine the benefits and costs of caching data for such appli...
David J. Yates, Erich M. Nahum, Jim Kurose, Prasha...
INFOCOM
2006
IEEE
14 years 2 months ago
Analyzing the Receiver Window Modification Scheme of TCP Queues
– Explicit Congestion Notification (ECN) and Active Queue Management (AQM) Schemes such as Random Early Detection (RED), Adaptive Random Early Detection (ARED) and BLUE queues ha...
Visvasuresh Victor Govindaswamy, Gergely V. Z&aacu...
ICRA
2010
IEEE
165views Robotics» more  ICRA 2010»
13 years 7 months ago
Vector field SLAM
— Designing a localization system for a low-cost robotic consumer product poses a major challenge. In previous work, we introduced Vector Field SLAM [5], a system for simultaneou...
Jens-Steffen Gutmann, Gabriel Brisson, Ethan Eade,...