Sciweavers

1690 search results - page 122 / 338
» Serial experiments online
Sort
View
IPCCC
2007
IEEE
15 years 10 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
15 years 10 months ago
Transaction Time Support Inside a Database Engine
Transaction time databases retain and provide access to prior states of a database. An update “inserts” a new record while preserving the old version. Immortal DB builds trans...
David B. Lomet, Roger S. Barga, Mohamed F. Mokbel,...
ICPADS
2005
IEEE
15 years 10 months ago
Efficient Implementation of 3G-324M Protocol Stack for Multimedia Communication
In order to support real-time video, audio and data communication among heterogeneous third generation (3G) handsets, 3G phones/terminals are required to support 3G-324M, the mult...
Weijia Jia, Bo Han, Ji Shen, Haohuan Fu, Man-Ching...
ISCAS
2005
IEEE
133views Hardware» more  ISCAS 2005»
15 years 10 months ago
Multiobjective VLSI cell placement using distributed simulated evolution algorithm
— Simulated Evolution (SimE) is a sound stochastic approximation algorithm based on the principles of adaptation. If properly engineered it is possible for SimE to reach nearopti...
Sadiq M. Sait, Ali Mustafa Zaidi, Mustafa I. Ali
PARELEC
2002
IEEE
15 years 9 months ago
Dynamic Process Partitioning and Migration for Irregular Applications
Many practical applications generate irregular, nonbalanced divide-and-conquer trees which have different depths, possibly also different numbers of successors at different levels...
Pawel Czarnul