Sciweavers

74 search results - page 13 / 15
» Towards a Monitoring Framework for Agent-Based Contract Syst...
Sort
View
JCP
2007
143views more  JCP 2007»
13 years 5 months ago
Alternatives for In-Service BER Estimation in All-Optical Networks: Towards Minimum Intrusion
— Combining the existing approaches for optical intelligence and the speed and capacity of light is undoubtedly the only viable strategy for building future-proof, highspeed netw...
Carolina Pinart
TSMC
2008
168views more  TSMC 2008»
13 years 5 months ago
Wise-ShopFloor: An Integrated Approach for Web-Based Collaborative Manufacturing
This paper presents an integrated approach for Web-based collaborative manufacturing, including distributed process planning, dynamic scheduling, real-time monitoring, and remote c...
Lihui Wang
CASES
2003
ACM
13 years 9 months ago
A hierarchical approach for energy efficient application design using heterogeneous embedded systems
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
Sumit Mohanty, Viktor K. Prasanna
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 2 days ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
SAC
2011
ACM
12 years 8 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty