Sciweavers

8780 search results - page 1623 / 1756
» On the Feasibility of Consistent Computations
Sort
View
CSE
2009
IEEE
15 years 1 months ago
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems
Abstract--Much of modern software development consists of assembling together existing software components and writing the glue code that integrates them into a unified application...
Eugen Leontie, Gedare Bloom, Bhagirath Narahari, R...
DAC
2010
ACM
15 years 1 months ago
Off-chip memory bandwidth minimization through cache partitioning for multi-core platforms
We present a methodology for off-chip memory bandwidth minimization through application-driven L2 cache partitioning in multicore systems. A major challenge with multi-core system...
Chenjie Yu, Peter Petrov
EENERGY
2010
15 years 1 months ago
Combustible gases and early fire detection: an autonomous system for wireless sensor networks
Fires or toxic gas leakages may have grave consequences like significant pecuniary loss or even lead to human victims. In this paper we present an autonomous wireless sensor syste...
Andrey Somov, D. Spirjakin, M. Ivanov, I. Khromush...
ICDCS
2010
IEEE
15 years 1 months ago
Guaranteeing BGP Stability with a Few Extra Paths
Abstract—Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet’s inter-domain ro...
Rachit Agarwal, Virajith Jalaparti, Matthew Caesar...
ICDCS
2010
IEEE
15 years 1 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
« Prev « First page 1623 / 1756 Last » Next »