Sciweavers

3751 search results - page 649 / 751
» Events in security protocols
Sort
View
SDL
2003
147views Hardware» more  SDL 2003»
14 years 11 months ago
Modelling and Evaluation of a Network on Chip Architecture Using SDL
Network on Chip (NoC) is a new paradigm for designing large and complex systems on chips (SoCs). In this paradigm, a packet switched network is provided for on-chip communication. ...
Rickard Holsmark, Magnus Högberg, Shashi Kuma...
CONCURRENCY
2010
110views more  CONCURRENCY 2010»
14 years 10 months ago
Redesigning the message logging model for high performance
Over the past decade the number of processors in the high performance facilities went up to hundreds of thousands. As a direct consequence, while the computational power follow th...
Aurelien Bouteiller, George Bosilca, Jack Dongarra
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 10 months ago
Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations
A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network. The effective allocation of bandwidth for VPNs assumes significance...
Mahalakshmi Chidambara Natarajan, Ramaswamy Muthia...
COMSUR
2008
193views more  COMSUR 2008»
14 years 10 months ago
A survey of multimedia streaming in wireless sensor networks
A wireless sensor network with multimedia capabilities typically consists of data sensor nodes, which sense, for instance, sound or motion, and video sensor nodes, which capture v...
Satyajayant Misra, Martin Reisslein, Guoliang Xue
IJSNET
2006
129views more  IJSNET 2006»
14 years 10 months ago
Emergency guiding and monitoring applications in indoor 3D environments by wireless sensor networks
Recently, wireless sensor networks have been widely discussed in many applications. In this paper, we propose a novel 3D emergency service that aims to guide people to safe places...
Meng-Shiuan Pan, Chia-Hung Tsai, Yu-Chee Tseng