Sciweavers

1784 search results - page 156 / 357
» Comparing designs for computer simulation experiments
Sort
View
94
Voted
CSE
2009
IEEE
15 years 10 months ago
Modelling of Pseudonymity under Probabilistic Linkability Attacks
—This paper contributes to the field of measuring (un)linkability in communication systems; a subproblem of privacy protection. We propose an attacker state model for attacks on...
Martin Neubauer
129
Voted
DATE
2009
IEEE
143views Hardware» more  DATE 2009»
15 years 10 months ago
Dimensioning heterogeneous MPSoCs via parallelism analysis
—In embedded computing we face a continuously growing algorithm complexity combined with a constantly rising number of applications running on a single system. Multi-core systems...
Bastian Ristau, Torsten Limberg, Oliver Arnold, Ge...
IPPS
2009
IEEE
15 years 10 months ago
Resource allocation strategies for constructive in-network stream processing
We consider the operator mapping problem for in-network stream processing, i.e., the application of a tree of operators in steady-state to multiple data objects that are continuou...
Anne Benoit, Henri Casanova, Veronika Rehn-Sonigo,...
ICPADS
2008
IEEE
15 years 9 months ago
Mobility-Assisted Position Estimation in Wireless Sensor Networks
Wireless sensor networks (WSNs) have been proposed for a multitude of location-dependent applications. To stamp the collected data and facilitate communication protocols, it is nec...
Hongyang Chen, Pei Huang, Hing-Cheung So, Kaoru Se...
IPPS
2008
IEEE
15 years 9 months ago
Towards feasibility and scalability of text search in peer-to-peer systems
— In this paper, we introduce a search engine, Dgoogle, designed for large scale P2P systems. Dgoogle is purely text-based, does not organize documents based on pre-defined keyw...
A. Lal, V. Gupta, Khaled Harfoush, Injong Rhee