Sciweavers

19003 search results - page 218 / 3801
» We Need Assurance!
Sort
View
ANCS
2008
ACM
14 years 24 days ago
Packet prediction for speculative cut-through switching
The amount of intelligent packet processing in an Ethernet switch continues to grow, in order to support of embedded applications such as network security, load balancing and qual...
Paul Congdon, Matthew Farrens, Prasant Mohapatra
IWRT
2008
14 years 6 days ago
Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard
Abstract. This paper addresses the evaluation of a passive RFID system under a continuous flow of tag arrivals and departures, for instance, in a conveyor belt installation. In suc...
Javier Vales-Alonso, M. Victoria Bueno-Delgado, Es...
IJCAI
2001
14 years 5 days ago
Executing Reactive, Model-based Programs through Graph-based Temporal Planning
In the future, webs of unmanned air and space vehicles will act together to robustly perform elaborate missions in uncertain environments. We coordinate these systems by introduci...
Phil Kim, Brian C. Williams, Mark Abramson
WCE
2007
13 years 12 months ago
Dynamic Traffic Regulation for WiFi Networks
— Multimedia applications require high bandwidth in order to assure certain level of Quality of Service (QoS). It is well known that the characteristics of the traffic for multim...
Domingo Marrero Marrero, Elsa María Mac&iac...
WOTUG
2007
13 years 12 months ago
Concurrency Control and Recovery Management for Open e-Business Transactions
Concurrency control mechanisms such as turn-taking, locking, serialization, transactional locking mechanism, and operational transformation try to provide data consistency when con...
Amir R. Razavi, Sotiris Moschoyiannis, Paul J. Kra...