Sciweavers

1192 search results - page 86 / 239
» Computing Weakest Readings
Sort
View
121
Voted
EUROPAR
2009
Springer
15 years 7 months ago
A Buffer Space Optimal Solution for Re-establishing the Packet Order in a MPSoC Network Processor
We consider a multi-processor system-on-chip destined for streaming applications. An application is composed of one input and one output queue and in-between, several levels of ide...
Daniela Genius, Alix Munier Kordon, Khouloud Zine ...
125
Voted
EUC
2006
Springer
15 years 7 months ago
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers
Abstract. Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the...
Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom
NSDI
2010
15 years 4 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman
133
Voted
CF
2010
ACM
15 years 3 months ago
Efficient cache design for solid-state drives
Solid-State Drives (SSDs) are data storage devices that use solid-state memory to store persistent data. Flash memory is the de facto nonvolatile technology used in most SSDs. It ...
Miaoqing Huang, Olivier Serres, Vikram K. Narayana...
147
Voted
SIGMOBILE
2008
72views more  SIGMOBILE 2008»
15 years 3 months ago
RFID-based networks: exploiting diversity and redundancy
In this article, we outline a research agenda for developing protocols and algorithms for densely populated RFID based systems covering a wide geographic area. This will need mult...
Nitin Vaidya, Samir R. Das