Sciweavers

9210 search results - page 1502 / 1842
» Analyzing Real-Time Systems
Sort
View
ICC
2008
IEEE
236views Communications» more  ICC 2008»
15 years 11 months ago
Carrier Sensing Based Multiple Access Protocols for Cognitive Radio Networks
—Cognitive radio (CR) dynamically accessing inactive radio spectrum of the primary system (PS) at link level has attracted a lot of research interests. The cognitive radio networ...
Shao-Yu Lien, Chih-Cheng Tseng, Kwang-Cheng Chen
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 11 months ago
On The Rate-Distance Adaptability of Slotted Aloha
—In wireless communication systems, the signal strength/quality generally varies with the distances between transmitters and receivers. As a consequence, the throughput in the MA...
Chih-Cheng Tseng, Shao-Yu Lien, Kwang-Cheng Chen, ...
ICCD
2008
IEEE
167views Hardware» more  ICCD 2008»
15 years 11 months ago
Exploiting spare resources of in-order SMT processors executing hard real-time threads
— We developed an SMT processor that allows a static WCET analysis of several hard real-time threads and uses the remaining resources for soft or non real-time threads. The analy...
Jörg Mische, Sascha Uhrig, Florian Kluge, The...
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
15 years 11 months ago
Compact Similarity Joins
— Similarity joins have attracted significant interest, with applications in Geographical Information Systems, astronomy, marketing analyzes, and anomaly detection. However, all...
Brent Bryan, Frederick Eberhardt, Christos Falouts...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 11 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
« Prev « First page 1502 / 1842 Last » Next »