Sciweavers

589 search results - page 85 / 118
» Accurate Dependability Analysis of CAN-Based Networked Syste...
Sort
View
ISLPED
2007
ACM
169views Hardware» more  ISLPED 2007»
15 years 3 months ago
Throughput of multi-core processors under thermal constraints
We analyze the effect of thermal constraints on the performance and power of multi-core processors. We propose system-level power and thermal models, and derive expressions for (a...
Ravishankar Rao, Sarma B. K. Vrudhula, Chaitali Ch...
MINENET
2006
ACM
15 years 8 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
PERCOM
2007
ACM
16 years 1 months ago
Buddy tracking - efficient proximity detection among mobile friends
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...
WWW
2004
ACM
16 years 2 months ago
Remindin': semantic query routing in peer-to-peer networks based on social metaphors
In peer-to-peer networks, finding the appropriate answer for an information request, such as the answer to a query for RDF(S) data, depends on selecting the right peer in the netw...
Christoph Tempich, Steffen Staab, Adrian Wranik
SRDS
2008
IEEE
15 years 8 months ago
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
Vinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsia...