Sciweavers

1518 search results - page 235 / 304
» Cryptographic Test Correction
Sort
View
96
Voted
SIGCOMM
2010
ACM
15 years 25 days ago
Running servers around zero degrees
Data centers are a major consumer of electricity and a significant fraction of their energy use is devoted to cooling the data center. Recent prototype deployments have investigat...
Mikko Pervilä, Jussi Kangasharju
97
Voted
ICASSP
2010
IEEE
15 years 24 days ago
Analysis of phone posterior feature space exploiting class-specific sparsity and MLP-based similarity measure
Class posterior distributions have recently been used quite successfully in Automatic Speech Recognition (ASR), either for frame or phone level classification or as acoustic featu...
Afsaneh Asaei, Benjamin Picart, Hervé Bourl...
HASE
2008
IEEE
15 years 23 days ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
97
Voted
ADHOC
2007
100views more  ADHOC 2007»
15 years 23 days ago
A GPS-less, outdoor, self-positioning method for wireless sensor networks
One challenging issue in sensor networks is to determine where a given sensor node is physically located. This problem is especially crucial for very small sensor nodes. This pape...
Hung-Chi Chu, Rong-Hong Jan
CN
2008
108views more  CN 2008»
15 years 22 days ago
Finding a dense-core in Jellyfish graphs
The connectivity of the Internet crucially depends on the relationships between thousands of Autonomous Systems (ASes) that exchange routing information using the Border Gateway P...
Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool