Sciweavers

732 search results - page 117 / 147
» Power minimization using control generated clocks
Sort
View
NDSS
2006
IEEE
15 years 3 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
ICCCN
2007
IEEE
15 years 4 months ago
Context Awareness through Cross-Layer Network Architecture
—Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better s...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon
CHI
2007
ACM
15 years 1 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
INFOCOM
2002
IEEE
15 years 2 months ago
QoS and Fairness Constrained Convex Optimization of Resource Allocation for Wireless Cellular and Ad Hoc Networks
— For wireless cellular and ad hoc networks with QoS constraints, we propose a suite of problem formulations that allocate network resources to optimize SIR, maximize throughput ...
David Julian, Mung Chiang, Daniel O'Neill, Stephen...
ECAI
1998
Springer
15 years 1 months ago
What You See Is What You Meant: direct knowledge editing with natural language feedback
Many kinds of knowledge-based system would be easier to develop and maintain if domain experts (as opposed to knowledge engineers) were in a position to define and edit the knowled...
Richard Power, Donia Scott, Roger Evans