Sciweavers

3154 search results - page 505 / 631
» An annotation based approach to support design communication
Sort
View
99
Voted
TON
2008
239views more  TON 2008»
14 years 10 months ago
Characterization of failures in an operational IP backbone network
Abstract--As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures...
Athina Markopoulou, Gianluca Iannaccone, Supratik ...
TWC
2008
156views more  TWC 2008»
14 years 10 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
89
Voted
CSCW
2002
ACM
14 years 10 months ago
Conventions and Commitments in Distributed CSCW Groups
Conventions are necessary to establish in any recurrent cooperative arrangement. In electronic work, they are important so as to regulate the use of shared objects. Based on empir...
Gloria Mark
MICRO
2010
IEEE
215views Hardware» more  MICRO 2010»
14 years 8 months ago
A Task-Centric Memory Model for Scalable Accelerator Architectures
This paper presents a task-centric memory model for 1000-core compute accelerators. Visual computing applications are emerging as an important class of workloads that can exploit ...
John H. Kelm, Daniel R. Johnson, Steven S. Lumetta...
106
Voted
DMIN
2009
180views Data Mining» more  DMIN 2009»
14 years 8 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...