Sciweavers

1154 search results - page 115 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
CODES
2007
IEEE
14 years 3 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
14 years 3 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
ISQED
2007
IEEE
150views Hardware» more  ISQED 2007»
14 years 3 months ago
A Design Methodology for Matching Improvement in Bandgap References
Errors caused by tolerance variations and mismatches among components severely degrade the performance of integrated circuits. These random effects in process parameters significa...
Juan Pablo Martinez Brito, Hamilton Klimach, Sergi...
ISCC
2006
IEEE
109views Communications» more  ISCC 2006»
14 years 3 months ago
Priority Oriented Adaptive Polling for wireless LANs
Today’s wireless LANs require efficient integration of multimedia and traditional data traffic. Multimedia network applications are time-bounded and have stricter QoS demands. T...
T. D. Lagkas, Georgios I. Papadimitriou, Petros Ni...
IH
2001
Springer
14 years 1 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu