Sciweavers

724 search results - page 144 / 145
» Medium access control issues in sensor networks
Sort
View
TMC
2008
112views more  TMC 2008»
13 years 5 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
ISCA
2007
IEEE
110views Hardware» more  ISCA 2007»
13 years 11 months ago
Late-binding: enabling unordered load-store queues
Conventional load/store queues (LSQs) are an impediment to both power-efficient execution in superscalar processors and scaling to large-window designs. In this paper, we propose...
Simha Sethumadhavan, Franziska Roesner, Joel S. Em...
GD
2008
Springer
13 years 6 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ICSE
2000
IEEE-ACM
13 years 9 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
WSCG
2004
151views more  WSCG 2004»
13 years 6 months ago
Inserting G1 Discontinuities into Free-form Features for Aesthetic Design
Free form shapes are often used to fulfil both aesthetic and design constraints applied to parametric models currently adopted in CAD environments. Up to now, designers and engine...
Vincent Cheutet, Jean-Philippe Pernot, Jean-Claude...