Sciweavers

1765 search results - page 336 / 353
» Communication Scheduling
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 3 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
DEBS
2009
ACM
15 years 3 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
MOBISYS
2010
ACM
15 years 2 months ago
NAPman: network-assisted power management for wifi devices
WiFi radios in smart-phones consume a significant amount of power when active. The 802.11 standard allows these devices to save power through an energy-conserving Power Save Mode ...
Eric Rozner, Vishnu Navda, Ramachandran Ramjee, Sh...
ACL
1998
15 years 1 months ago
Learning Intonation Rules for Concept to Speech Generation
In this paper, we report on an effort to provide a general-purpose spoken language generation tool for Concept-to-Speech (CTS) applications by extending a widely used text generat...
Shimei Pan, Kathleen McKeown
FGCN
2007
IEEE
125views Communications» more  FGCN 2007»
14 years 12 months ago
Evaluation of a Simple Load Balancing Improvement for Reliable Server Pooling with Heterogeneous Server Pools
The IETF is currently standardizing a light-weight protocol framework for server redundancy and session failover: Reliable Server Pooling (RSerPool). It is the novel combination o...
Xing Zhou, Thomas Dreibholz, Erwin P. Rathgeb