Sciweavers

2120 search results - page 309 / 424
» Mapping the Gnutella Network
Sort
View
98
Voted
DSD
2008
IEEE
165views Hardware» more  DSD 2008»
15 years 7 months ago
Application Analysis for Parallel Processing
Effective mapping of multimedia applications on massively parallel embedded systems is a challenging demand in the domain of compiler design. The software implementations of emerg...
Muhammad Rashid, Damien Picard, Bernard Pottier
102
Voted
ETFA
2008
IEEE
15 years 7 months ago
e-based inter-enterprise supply chain Kanban for demand and order fulfilment management
– The philosophy of Kanban is that parts and materials should be supplied at the very moment they are needed in the factory manufacturing process. e-based inter-enterprise supply...
Linton L. S. Chai
91
Voted
WCNC
2008
IEEE
15 years 7 months ago
Modeling an Opportunistic Spectrum Sharing System with a Correlated Arrival Process
— In an opportunistic spectrum sharing (OSS) wireless network there are two types of users: primary users and secondary users. The primary users own the license for the system ba...
Shensheng Tang, Brian L. Mark
121
Voted
WCNC
2008
IEEE
15 years 7 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...
ICON
2007
IEEE
15 years 7 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...