Sciweavers

EUC
2006
Springer
14 years 11 days ago
Perturbative Time and Frequency Allocations for RFID Reader Networks
Vinay Deolalikar, Malena R. Mesarina, John Recker,...
EUC
2006
Springer
14 years 11 days ago
A Lightweight IP Traceback Mechanism on IPv6
Due to the stateless nature of the internet, it is an intricate problem to determine the source of spoofed attacking packets. To handle this problem we utilize the IP traceback mec...
Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
EUC
2006
Springer
14 years 11 days ago
A Processor Extension for Cycle-Accurate Real-Time Software
Certain hard real-time tasks demand precise timing of events, but the usual software solution of periodic interrupts driving a scheduler only provides precision in the millisecond ...
Nicholas Jun Hao Ip, Stephen A. Edwards
EUC
2006
Springer
14 years 11 days ago
On Multiprocessor Utility Accrual Real-Time Scheduling with Statistical Timing Assurances
We present the first Utility Accrual (or UA) real-time scheduling algorithm for multiprocessors, called gMUA. The algorithm considers an application model where real-time activiti...
Hyeonjoong Cho, Haisang Wu, Binoy Ravindran, E. Do...
EGICE
2006
14 years 11 days ago
Wireless Sensing, Actuation and Control - With Applications to Civil Structures
Structural monitoring and control have been subjects of interests in structural engineering for quite some time. Structural sensing and control technologies can benefit in terms of...
Yang Wang 0013, Jerome P. Lynch, Kincho H. Law
EGICE
2006
14 years 11 days ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith
EGICE
2006
14 years 11 days ago
Model Free Interpretation of Monitoring Data
Daniele Posenato, Francesca Lanata, Daniele Inaudi...