Sciweavers

2407 search results - page 137 / 482
» Design considerations for network processor operating system...
Sort
View
ICNP
2007
IEEE
15 years 10 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
ICCAD
2001
IEEE
106views Hardware» more  ICCAD 2001»
16 years 27 days ago
System-Level Power/Performance Analysis of Portable Multimedia Systems Communicating over Wireless Channels
This paper presents a new methodology for system-level power and performance analysis of wireless multimedia systems. More precisely, we introduce an analytical approach based on ...
Radu Marculescu, Amit Nandi, Luciano Lavagno, Albe...
CCS
1994
ACM
15 years 8 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
CASES
2006
ACM
15 years 10 months ago
A case study of multi-threading in the embedded space
The continuing miniaturization of technology coupled with wireless networks has made it feasible to physically embed sensor network systems into the environment. Sensor net proces...
Greg Hoover, Forrest Brewer, Timothy Sherwood
151
Voted
ECRTS
2007
IEEE
15 years 10 months ago
On Dominating Set Allocation Policies in Real-Time Wide-Area Distributed Systems
This paper investigates resource allocation policies for achieving real-time content distribution with subsecond delay bounds on the current Internet. Resource allocation in real-...
Chengdu Huang, Tarek F. Abdelzaher, Xue Liu