Sciweavers

3031 search results - page 481 / 607
» Investigating human-computer optimization
Sort
View
135
Voted
ICN
2005
Springer
15 years 8 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...
110
Voted
LCTRTS
2005
Springer
15 years 8 months ago
Upper bound for defragmenting buddy heaps
Knuth’s buddy system is an attractive algorithm for managing storage allocation, and it can be made to operate in real-time. At some point, storage-management systems must eithe...
Delvin C. Defoe, Sharath R. Cholleti, Ron Cytron
94
Voted
MSN
2005
Springer
15 years 8 months ago
Handling Sensed Data in Hostile Environments
Systems that track sensed data trigger alerts based on the evaluation of some condition. In the presence of loss data a conservative condition may not generate a necessary alert an...
Oren Ben-Zwi, Shlomit S. Pinter
111
Voted
WAC
2005
Springer
118views Communications» more  WAC 2005»
15 years 8 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
ASPDAC
2004
ACM
93views Hardware» more  ASPDAC 2004»
15 years 8 months ago
Layer assignment for reliable system-on-package
—The routing environment for the new emerging mixed-signal System-on-Package (SOP) technology is more advanced than that of the conventional PCB or MCM technology – pins are lo...
Jacob R. Minz, Sung Kyu Lim