Sciweavers

1410 search results - page 254 / 282
» Performance Analysis for a Two-Ring Distributed MIMO-OFDM Sy...
Sort
View
127
Voted
SOSP
2007
ACM
16 years 12 days ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
134
Voted
HPCA
2006
IEEE
16 years 3 months ago
Completely verifying memory consistency of test program executions
An important means of validating the design of commercial-grade shared memory multiprocessors is to run a large number of pseudo-random test programs on them. However, when intent...
Chaiyasit Manovit, Sudheendra Hangal
INFOCOM
2007
IEEE
15 years 9 months ago
Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks
—Existing methods of measuring lifetimes in P2P systems usually rely on the so-called Create-Based Method (CBM) [16], which divides a given observation window into two halves and...
Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov
153
Voted
IPSN
2007
Springer
15 years 9 months ago
A compact, high-speed, wearable sensor network for biomotion capture and interactive media
In this paper, we present a wireless sensor platform designed for processing multipoint human motion with low latency and high resolution. One application considered here is inter...
Ryan Aylward, Joseph A. Paradiso
PPOPP
2010
ACM
16 years 24 days ago
Using data structure knowledge for efficient lock generation and strong atomicity
To achieve high-performance on multicore systems, sharedmemory parallel languages must efficiently implement atomic operations. The commonly used and studied paradigms for atomici...
Gautam Upadhyaya, Samuel P. Midkiff, Vijay S. Pai