Sciweavers

2841 search results - page 554 / 569
» A Call to Order
Sort
View
SAC
2008
ACM
14 years 9 months ago
Model-driven development of component-based adaptive distributed applications
This paper introduces an approach to develop componentbased adaptive distributed applications. Our approach separates the communication and the functional aspects of a distributed...
An Phung-Khac, Antoine Beugnard, Jean-Marie Gillio...
TON
2008
108views more  TON 2008»
14 years 9 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 8 months ago
Popularity at Minimum Cost
We consider an extension of the popular matching problem in this paper. The input to the popular matching problem is a bipartite graph G = (A ∪ B, E), where A is a set of people,...
Telikepalli Kavitha, Meghana Nasre, Prajakta Nimbh...
80
Voted
DSD
2010
IEEE
112views Hardware» more  DSD 2010»
14 years 8 months ago
Re-NUCA: Boosting CMP Performance Through Block Replication
— Chip Multiprocessor (CMP) systems have become the reference architecture for designing micro-processors, thanks to the improvements in semiconductor nanotechnology that have co...
Pierfrancesco Foglia, Cosimo Antonio Prete, Marco ...
ISSRE
2010
IEEE
14 years 8 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...