Sciweavers

247 search results - page 40 / 50
» Infrastructure Risk Reduction
Sort
View
JUCS
2007
108views more  JUCS 2007»
14 years 9 months ago
On Pipelining Sequences of Data-Dependent Loops
: Sequences of data-dependent tasks, each one traversing large data sets, exist in many applications (such as video, image and signal processing applications). Those tasks usually ...
Rui Rodrigues, João M. P. Cardoso
SJ
2010
158views more  SJ 2010»
14 years 4 months ago
Efficient Utilization of Renewable Energy Sources by Gridable Vehicles in Cyber-Physical Energy Systems
The main sources of emission today are from the electric power and transportation sectors. One of the main goals of a cyber-physical energy system (CPES) is the integration of rene...
A. Y. Saber, Ganesh K. Venayagamoorthy
IWNAS
2008
IEEE
15 years 3 months ago
POND: The Power of Zone Overlapping in DHT Networks
— Distributed Hash Table (DHT) based algorithms have been proposed to solve the routing issues in large-scale Peer-to-Peer (P2P) applications. DHT systems create an elegant Peer-...
Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan
TRIDENTCOM
2008
IEEE
15 years 3 months ago
Performance analysis of a lightweight NEMO implementation for low-end devices
IETF Network Mobility (NEMO) Basic Support Protocol is an IP mobility management protocol designed to provide seamless IP mobility to complete networks. This protocol is of crucia...
J. L. Almodovar, Antonio de la Oliva, C. Lazo Ram,...
105
Voted
WORDS
2005
IEEE
15 years 3 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...