Sciweavers

1518 search results - page 235 / 304
» Cryptographic Test Correction
Sort
View
SIGCOMM
2010
ACM
15 years 3 months ago
Running servers around zero degrees
Data centers are a major consumer of electricity and a significant fraction of their energy use is devoted to cooling the data center. Recent prototype deployments have investigat...
Mikko Pervilä, Jussi Kangasharju
121
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Analysis of phone posterior feature space exploiting class-specific sparsity and MLP-based similarity measure
Class posterior distributions have recently been used quite successfully in Automatic Speech Recognition (ASR), either for frame or phone level classification or as acoustic featu...
Afsaneh Asaei, Benjamin Picart, Hervé Bourl...
161
Voted
HASE
2008
IEEE
15 years 3 months ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
124
Voted
ADHOC
2007
100views more  ADHOC 2007»
15 years 3 months ago
A GPS-less, outdoor, self-positioning method for wireless sensor networks
One challenging issue in sensor networks is to determine where a given sensor node is physically located. This problem is especially crucial for very small sensor nodes. This pape...
Hung-Chi Chu, Rong-Hong Jan
129
Voted
CN
2008
108views more  CN 2008»
15 years 3 months ago
Finding a dense-core in Jellyfish graphs
The connectivity of the Internet crucially depends on the relationships between thousands of Autonomous Systems (ASes) that exchange routing information using the Border Gateway P...
Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool