Sciweavers

2067 search results - page 246 / 414
» Modeling and Simulation of Operating System Behavior
Sort
View
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
14 years 10 months ago
Verification of chip multiprocessor memory systems using a relaxed scoreboard
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to ...
Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin...
CORR
2007
Springer
138views Education» more  CORR 2007»
14 years 10 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
PEWASUN
2005
ACM
15 years 3 months ago
Impact of multipath fading in wireless ad hoc networks
This paper examines several MANET behaviors and suggests root causes using a stochastic model of received power. It focuses specifically on MANET mechanisms most impacted by fin...
John Mullen, Hong Huang
ANSOFT
2002
171views more  ANSOFT 2002»
14 years 9 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
HICSS
2009
IEEE
177views Biometrics» more  HICSS 2009»
15 years 4 months ago
Intelligent Alarm Processing: From Data Intensive to Information Rich
The requirement for power system operators to respond more efficiently to the stressed power system conditions that may create large number of alarms asks fort advanced alarm proc...
Mladen Kezunovic, Yufan Guan