Sciweavers

1566 search results - page 202 / 314
» Contification Using Dominators
Sort
View
104
Voted
PERCOM
2008
ACM
16 years 1 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
MOBIHOC
2004
ACM
16 years 1 months ago
Locating cache proxies in manets
Caching Internet based services is a potentially important application for MANETs, as it can improve mobile users' perceived quality of service, reduce their energy consumpti...
Roy Friedman, Maria Gradinariu, Gwendal Simon
ICCD
2003
IEEE
145views Hardware» more  ICCD 2003»
15 years 11 months ago
Care Bit Density and Test Cube Clusters: Multi-Level Compression Opportunities
: Most of the recently discussed and commercially introduced test stimulus data compression techniques are based on low care bit densities found in typical scan test vectors. Data ...
Bernd Könemann
112
Voted
ICCD
2001
IEEE
106views Hardware» more  ICCD 2001»
15 years 11 months ago
A Low-Power Cache Design for CalmRISCTM-Based Systems
Lowering power consumption in microprocessors, whether used in portables or not, has now become one of the most critical design concerns. On-chip cache memories tend to occupy dom...
Sangyeun Cho, Wooyoung Jung, Yongchun Kim, Seh-Woo...
SIGCSE
2010
ACM
158views Education» more  SIGCSE 2010»
15 years 9 months ago
Test-first Java concurrency for the classroom
Concurrent programming is becoming more important due to the growing dominance of multi-core processors and the prevalence of graphical user interfaces (GUIs). To prepare students...
Mathias Ricken, Robert Cartwright