Sciweavers

2500 search results - page 400 / 500
» Specifying Behavior in C
Sort
View
153
Voted
TELSYS
2002
122views more  TELSYS 2002»
15 years 3 months ago
Performance Analysis of Reassembly and Multiplexing Queueing with Long-Range-Dependent Input Traffic
This paper studies the impact of long-range-dependent (LRD) traffic on the performance of reassembly and multiplexing queueing. A queueing model characterizing the general reassemb...
George C. Lin, Tatsuya Suda, Fumio Ishizaki
MJ
2007
132views more  MJ 2007»
15 years 2 months ago
Mechanism and thermal effect of delamination in light-emitting diode packages
In this paper we report on the mechanism of delamination in light-emitting diode (LED) packages and its effects on thermal characteristics of LEDs. The LED samples were subjected ...
Jianzheng Hu, Lianqiao Yang, Moo Whan Shin
151
Voted
ICFEM
2010
Springer
15 years 1 months ago
Model-Driven Protocol Design Based on Component Oriented Modeling
Abstract. Due to new emerging areas in the communication field there is a constant need for the design of novel communication protocols. This demands techniques for a rapid and eff...
Prabhu Shankar Kaliappan, Hartmut König, Seba...
118
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
MSET: A Mobility Satellite Emulation Testbed
—Satellite systems are ideal for distributing the same content to a large number of users, as well as providing broadband connectivity in remote areas or backup in case of terres...
Roman Chertov, Daniel M. Havey, Kevin C. Almeroth
139
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...