Sciweavers

5615 search results - page 1047 / 1123
» Active Learner Modelling
Sort
View
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
15 years 9 months ago
Thermal-induced leakage power optimization by redundant resource allocation
Traditionally, at early design stages, leakage power is associated with the number of transistors in a design. Hence, intuitively an implementation with minimum resource usage wou...
Min Ni, Seda Ogrenci Memik
INFOCOM
2006
IEEE
15 years 9 months ago
A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks
— Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In ...
Jianfeng Wang, Yuguang Fang, Dapeng Oliver Wu
158
Voted
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
15 years 9 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
IMC
2006
ACM
15 years 9 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
MINENET
2006
ACM
15 years 9 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
« Prev « First page 1047 / 1123 Last » Next »