Sciweavers

1080 search results - page 121 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
INFOCOM
2003
IEEE
15 years 3 months ago
A Framework for Incremental Deployment Strategies for Router-Assisted Services
— Incremental deployment of a new network service or protocol is typically a hard problem, especially when it has to be deployed in the routers. First, an incrementally deployabl...
Xinming He, Christos Papadopoulos, Pavlin Radoslav...
CORR
2010
Springer
133views Education» more  CORR 2010»
14 years 10 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
BMCBI
2007
106views more  BMCBI 2007»
14 years 10 months ago
In silico identification of NF-kappaB-regulated genes in pancreatic beta-cells
Background: Pancreatic beta-cells are the target of an autoimmune attack in type 1 diabetes mellitus (T1DM). This is mediated in part by cytokines, such as interleukin (IL)-1β an...
Najib Naamane, Jacques van Helden, Decio L. Eiziri...
CODES
2003
IEEE
15 years 3 months ago
Design optimization of mixed time/event-triggered distributed embedded systems
Distributed embedded systems implemented with mixed, eventtriggered and time-triggered task sets, which communicate over bus protocols consisting of both static and dynamic phases...
Traian Pop, Petru Eles, Zebo Peng
EMSOFT
2006
Springer
15 years 1 months ago
An analysis framework for network-code programs
Distributed real-time systems require a predictable and verifiable mechanism to control the communication medium. Current real-time communication protocols are typically independe...
Madhukar Anand, Sebastian Fischmeister, Insup Lee