Sciweavers

4438 search results - page 818 / 888
» On the Distribution of Keys by Hashing
Sort
View
MICRO
2008
IEEE
148views Hardware» more  MICRO 2008»
15 years 6 months ago
Coordinated management of multiple interacting resources in chip multiprocessors: A machine learning approach
—Efficient sharing of system resources is critical to obtaining high utilization and enforcing system-level performance objectives on chip multiprocessors (CMPs). Although sever...
Ramazan Bitirgen, Engin Ipek, José F. Mart&...
PIMRC
2008
IEEE
15 years 6 months ago
Connection admission control and grade of service for QoS routing in mesh networks
—Wireless mesh networks (WMNs) is a promising key technology for next generation wireless backhauling that have recently attracted both the academic and industrial interest. Such...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
RAM
2008
IEEE
124views Robotics» more  RAM 2008»
15 years 6 months ago
Mechatronics Considerations for Assisting Humans
Mechatronics technologies are now steadily penetrating in our daily lives. We are surrounded by mechatronic products and interact with them in many ways. In particular, mechatroni...
Masayoshi Tomizuka
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 6 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
WIMOB
2008
IEEE
15 years 6 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao