Sciweavers

12131 search results - page 2085 / 2427
» Introduction to Modeling and Simulation
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
P2P
2007
IEEE
15 years 11 months ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
PRDC
2007
IEEE
15 years 11 months ago
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems
We propose a comprehensive solution to handle memory-overflow problems in multitasking embedded systems thereby improving their reliability and availability. In particular, we pro...
Vinaitheerthan Sundaram, Sandip HomChaudhuri, Sach...
QEST
2007
IEEE
15 years 11 months ago
A Productivity Centered Tools Framework for Application Performance Tuning
Our productivity centered performance tuning framework for HPC applications comprises of three main components: (1) a versatile source code, performance metrics, and performance d...
Hui-Fang Wen, Simone Sbaraglia, Seetharami Seelam,...
QSIC
2007
IEEE
15 years 11 months ago
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Zhenyu Zhang, W. K. Chan, T. H. Tse
« Prev « First page 2085 / 2427 Last » Next »