Sciweavers

3053 search results - page 276 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
ICC
2000
IEEE
113views Communications» more  ICC 2000»
15 years 6 months ago
LSMAC and LSNAT: Two Approaches for Cluster-Based Scalable Web Servers
— Server responsiveness and scalability are more important than ever in today’s client/server dominated network environments. Recently, researchers have begun to consider clust...
Xuehong Gan, Trevor Schroeder, Steve Goddard, Byra...
JSAC
2008
95views more  JSAC 2008»
15 years 28 days ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
FMICS
2010
Springer
15 years 2 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó
CIARP
2007
Springer
15 years 8 months ago
Dynamic Penalty Based GA for Inducing Fuzzy Inference Systems
Abstract. Fuzzy based models have been used in many areas of research. One issue with these models is that rule bases have the potential for indiscriminant growth. Inference system...
Tomás Arredondo Vidal, Félix V&aacut...
RV
2010
Springer
171views Hardware» more  RV 2010»
15 years 10 days ago
Runtime Verification for Software Transactional Memories
Software transactional memories (STMs) promise simple and efficient concurrent programming. Several correctness properties have been proposed for STMs. Based on a bounded conflict ...
Vasu Singh