Sciweavers

666 search results - page 79 / 134
» Fair watermarking techniques
Sort
View
CHARME
1997
Springer
105views Hardware» more  CHARME 1997»
15 years 1 months ago
Simulation-based verification of network protocols performance
Formal verification techniques need to deal with the complexity of the systems rified. Most often, this problem is solved by taking an abstract model of the system and aiming at a...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Pa...
AINA
2009
IEEE
15 years 11 days ago
Benchmarking Latency Effects on Mobility Tracking in WSNs
The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network's data. As node hibernation techni...
Richard Tynan, Michael J. O'Grady, Gregory M. P. O...
GRID
2008
Springer
14 years 10 months ago
Market-oriented Grids and Utility Computing: The State-of-the-art and Future Directions
Traditional resource management techniques (resource allocation, admission control and scheduling) have been found to be inadequate for many shared Grid and distributed systems th...
James Broberg, Srikumar Venugopal, Rajkumar Buyya
SBMF
2010
Springer
205views Formal Methods» more  SBMF 2010»
14 years 4 months ago
A High-Level Language for Modeling Algorithms and Their Properties
Designers of concurrent and distributed algorithms usually express them using pseudo-code. In contrast, most verification techniques are based on more mathematically-oriented forma...
Sabina Akhtar, Stephan Merz, Martin Quinson
PERCOM
2008
ACM
15 years 9 months ago
Context-aware Battery Management for Mobile Phones
In this paper, we propose a system for contextaware battery management that warns the user when it detects that the phone battery can run out before the next charging opportunity ...
Nishkam Ravi, James Scott, Lu Han, Liviu Iftode