Sciweavers

1474 search results - page 197 / 295
» Exploiting Locality in a TMS
Sort
View
ISSRE
2008
IEEE
15 years 11 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
LCN
2008
IEEE
15 years 11 months ago
Efficient power management for Wireless Sensor Networks: A data-driven approach
—Providing energy-efficient continuous data collection services is of paramount importance to Wireless Sensor Network (WSN) applications. This paper proposes a new power manageme...
MingJian Tang, Jinli Cao, Xiaohua Jia
SASO
2008
IEEE
15 years 11 months ago
The Meaning of Semiochemicals to the Design of Self-Organizing Systems
In biology, many organisms coordinate their interactions in a self-organizing and emergent way solely by means of indirect communication based on chemical substances. These so-cal...
Holger Kasinger, Bernhard Bauer, Jörg Denzing...
CODES
2007
IEEE
15 years 11 months ago
Performance and resource optimization of NoC router architecture for master and slave IP cores
System-on-Chip architectures incorporate several IP cores with well defined master and slave characteristics in terms of on-chip communication. The paper presents a parameterized ...
Glenn Leary, Krishna Mehta, Karam S. Chatha
ICC
2007
IEEE
180views Communications» more  ICC 2007»
15 years 11 months ago
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks
— In contrast to the traditional wireless sensor network (WSN) applications that perform only data collection and aggregation, new generation of information processing applicatio...
Murat Demirbas, Xuming Lu