Sciweavers

726 search results - page 99 / 146
» From Anomaly Reports to Cases
Sort
View
ICPP
2008
IEEE
15 years 6 months ago
Implementing and Exploiting Inevitability in Software Transactional Memory
—Transactional Memory (TM) takes responsibility for concurrent, atomic execution of labeled regions of code, freeing the programmer from the need to manage locks. Typical impleme...
Michael F. Spear, Michael Silverman, Luke Dalessan...
ISCC
2008
IEEE
142views Communications» more  ISCC 2008»
15 years 6 months ago
A measurement study of Speex VoIP and H.264/AVC video over IEEE 802.16d and IEEE 802.11g
We evaluate the capacity of an IEEE 802.16d and IEEE 802.11g testbed to simultaneously carry emulated H.264/AVC video and Speex VoIP and present results from an extensive measurem...
Kostas Pentikousis, Jarno Pinola, Esa Piri, Frerk ...
VTC
2008
IEEE
141views Communications» more  VTC 2008»
15 years 6 months ago
Address Assignment and Routing Schemes for ZigBee-Based Long-Thin Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) have been extensively researched recently. This paper makes two contributions to this field. First, we promote a new concept of long-thi...
Meng-Shiuan Pan, Hua-Wei Fang, Yung-Chih Liu, Yu-C...
FOCS
2007
IEEE
15 years 6 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
15 years 6 months ago
A Visualization Framework for Task-Oriented Modeling Using UML
— The UML is a collection of 13 diagram notations to describe different views of a software system. The existing diagram types display model elements and their relations. Softwar...
Christian F. J. Lange, Martijn A. M. Wijns, Michel...