Sciweavers

8093 search results - page 1546 / 1619
» Design optimization
Sort
View
COMPGEOM
2009
ACM
15 years 11 months ago
Embedding rivers in polyhedral terrains
Data conflation is a major issue in GIS: spatial data obtained from different sources, using different acquisition techniques, needs to be combined into one single consistent d...
Marc J. van Kreveld, Rodrigo I. Silveira
IMC
2009
ACM
15 years 11 months ago
The importance of being overheard: throughput gains in wireless mesh networks
A flurry of recent work has focused on the performance gains that may be achieved by leveraging the broadcast nature of the wireless channel. In particular, researchers have obse...
Mikhail Afanasyev, Alex C. Snoeren
140
Voted
ISLPED
2009
ACM
178views Hardware» more  ISLPED 2009»
15 years 11 months ago
Power management in energy harvesting embedded systems with discrete service levels
Power management has been a critical issue in the design of embedded systems due to the limited power supply. To prolong the lifetime, energy minimization has been studied under p...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
147
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
Hash, don't cache: fast packet forwarding for enterprise edge routers
As forwarding tables and link speeds continue to grow, fast packet forwarding becomes increasingly challenging for enterprise edge routers. Simply building routers with ever large...
Minlan Yu, Jennifer Rexford
ACSAC
2008
IEEE
15 years 11 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 1546 / 1619 Last » Next »