Sciweavers

5790 search results - page 829 / 1158
» Distributed programming with distributed authorization
Sort
View
VTC
2008
IEEE
124views Communications» more  VTC 2008»
15 years 9 months ago
Efficient Reliable Data Collection in Wireless Sensor Networks
— We propose an Efficient Reliable Data Collection (eRDC) algorithm. The eRDC is designed for energy-constraint wireless sensor networks (WSN) to balance reliability and energy c...
Ren Ping Liu, John Zic, Iain B. Collings, Alex Y. ...
IEEEPACT
2007
IEEE
15 years 9 months ago
A Loop Correlation Technique to Improve Performance Auditing
Performance auditing is an online optimization strategy that empirically measures the effectiveness of an optimization on a particular code region. It has the potential to greatly...
Jeremy Lau, Matthew Arnold, Michael Hind, Brad Cal...
CONCUR
2007
Springer
15 years 9 months ago
A Marriage of Rely/Guarantee and Separation Logic
Abstract. In the quest for tractable methods for reasoning about concurrent algorithms both rely/guarantee logic and separation logic have made great advances. They both seek to ta...
Viktor Vafeiadis, Matthew J. Parkinson
ESAW
2007
Springer
15 years 9 months ago
Amongst First-Class Protocols
The ubiquity of our increasingly distributed and complex computing environments have necessitated the development of programming approaches and paradigms that can automatically man...
Tim Miller, Jarred McGinnis
EUROPAR
2007
Springer
15 years 9 months ago
Starvation-Free Transactional Memory-System Protocols
Abstract. Transactional memory systems trade ease of programming with runtime performance losses in handling transactions. This paper focuses on starvation effects that show up in ...
M. M. Waliullah, Per Stenström