Sciweavers

725 search results - page 117 / 145
» Bounding Degrees on RPL
Sort
View
106
Voted
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
15 years 9 months ago
Code Placement with Selective Cache Activity Minimization for Embedded Real-time Software Design
– Many embedded system designs usually impose (hard) read-time constraints on tasks. Thus, computing a tight upper bound of the worst case execution time (WCET) of a software is ...
Junhyung Um, Taewhan Kim
SIES
2009
IEEE
15 years 7 months ago
Real-time enabled IEEE 802.15.4 sensor networks in industrial automation
—Sensor networks have been investigated in many scenarios and a good number of protocols have been developed. With the standardization of the IEEE 802.15.4 protocol, sensor netwo...
Feng Chen, Thomas Talanis, Reinhard German, Falko ...
98
Voted
WG
2009
Springer
15 years 7 months ago
Distance d-Domination Games
Abstract. We study graph searching games where a number of cops try to capture a robber that is hiding in a system of tunnels modelled as a graph. While the current position of the...
Stephan Kreutzer, Sebastian Ordyniak
83
Voted
ISSAC
2009
Springer
139views Mathematics» more  ISSAC 2009»
15 years 7 months ago
Multihomogeneous resultant formulae for systems with scaled support
Constructive methods for matrices of multihomogeneous resultants for unmixed systems have been studied in [7, 14, 16]. We generalize these constructions to mixed systems, whose Ne...
Ioannis Z. Emiris, Angelos Mantzaflaris
91
Voted
AINA
2008
IEEE
15 years 7 months ago
Optimal Resource Discovery Paths of Gnutella2
This paper shows that the performance of peer-to-peer resource discovery algorithms is upper bounded by a k-Steiner minimum tree and proposes an algorithm locating near-optimal qu...
Mikko Vapa, Annemari Auvinen, Yevgeniy Ivanchenko,...