Search
Now showing items 11-18 of 18
Visibility Visualization And Haptic Path Exploration
(2009-08-19)
We propose a real-time system to visualize multi-viewpoint visibility information for terrains, supporting flight path optimization for view coverage or vehicle exposure to ground. A volume rendered display and a haptic ...
QoS Over Multihop Wireless Networks
(2009-05-12)
The aim of this work is to understand the requirements behind Quality of Service (QoS) for Multihop Wireless Networks and evaluate the performance of different such strategies. This work starts by establishing the basis ...
CDMA Base Station Receive Co-Processor Architecture
(2007-10-23)
Third generation mobile communication systems promise a greater data rate and new services to the mobile subscribers. 3G systems support up to 2 Mbps of data rate to a fixed subscriber and 144 Kbps of data rate to a fully ...
Checkpointing Algorithms for Parallel Computers
(Indian Institute of Science, 2005-02-11)
Checkpointing is a technique widely used in parallel/distributed computers for rollback error recovery. Checkpointing is defined as the coordinated saving of process state information at specified time instances. Checkpoints ...
Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems
(2009-04-13)
Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ...
A Systematic Approach To Synthesis Of Verification Test-Suites For Modular SoC Designs
(2009-03-03)
SoCs (System on Chips) are complex designs with heterogeneous modules (CPU, memory, etc.) integrated in them. Verification is one of the important stages in designing an SoC. Verification is the process of checking if the ...
Applications Of Machine Learning To Anomaly Based Intrusion Detection
(2009-03-02)
This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...
Power-Aware Compilation Techniques For Embedded Systems
(2008-01-25)
The demand for devices like Personal Digital Assistants (PDA’s), Laptops, Smart Mobile
Phones, are at an all time high. As the demand for these devices increases, so is the push to provide sophisticated functionalities ...