Sciweavers

964 search results - page 180 / 193
» On Securely Scheduling a Meeting
Sort
View
SENSYS
2003
ACM
15 years 2 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
ICSOC
2003
Springer
15 years 2 months ago
Disconnected Operation Service in Mobile Grid Computing
Abstract. In this paper, we discuss on the extension of grid computing systems in mobile computing environments, where mobile devices can be effectively incorporated into the grid ...
Sang-Min Park, Young-Bae Ko, Jai-Hoon Kim
HOTOS
2007
IEEE
15 years 1 months ago
Processor Hardware Counter Statistics as a First-Class System Resource
Today's processors provide a rich source of statistical information on program execution characteristics through hardware counters. However, traditionally, operating system (...
Xiao Zhang, Sandhya Dwarkadas, Girts Folkmanis, Ka...
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
15 years 1 months ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...
WSC
2008
14 years 11 months ago
Experience in the broadening of a single-purpose simulation model
Simulation models are often developed for a single purpose. However, once a model is accepted by management and other stake-holders, it is quite common and desirable to wish to br...
Reid L. Kress, Pete Bereolos, Karen Bills, James C...