Sciweavers

206 search results - page 41 / 42
» Analyzing the Parameters of Prey-Predator Models for Simulat...
Sort
View
MICRO
2007
IEEE
167views Hardware» more  MICRO 2007»
14 years 14 days ago
Informed Microarchitecture Design Space Exploration Using Workload Dynamics
Program runtime characteristics exhibit significant variation. As microprocessor architectures become more complex, their efficiency depends on the capability of adapting with wor...
Chang-Burm Cho, Wangyuan Zhang, Tao Li
SENSYS
2005
ACM
13 years 11 months ago
Estimating clock uncertainty for efficient duty-cycling in sensor networks
Radio duty cycling has received significant attention in sensor networking literature, particularly in the form of protocols for medium access control and topology management. Whi...
Saurabh Ganeriwal, Deepak Ganesan, Hohyun Shim, Vl...
WDAG
2009
Springer
147views Algorithms» more  WDAG 2009»
14 years 23 days ago
Compact Routing in Power-Law Graphs
Abstract. We adapt the compact routing scheme by Thorup and Zwick to optimize it for power-law graphs. We analyze our adapted routing scheme based on the theory of unweighted rando...
Wei Chen, Christian Sommer 0002, Shang-Hua Teng, Y...
AINA
2007
IEEE
14 years 16 days ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng
IPPS
2006
IEEE
14 years 6 days ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang