Sciweavers

1482 search results - page 257 / 297
» Tailor-Made Operating Systems for Embedded Parallel Applicat...
Sort
View
VIP
2001
14 years 11 months ago
Image Segmentation on Spiral Architecture
Spiral Architecture is a relatively new and powerful approach to general purpose machine vision system. It contains very useful geometric and algebraic properties. Two algebraic o...
Qiang Wu, Xiangjian He, Tom Hintz
IEEEPACT
2008
IEEE
15 years 4 months ago
Multi-mode energy management for multi-tier server clusters
This paper presents an energy management policy for reconfigurable clusters running a multi-tier application, exploiting DVS together with multiple sleep states. We develop a the...
Tibor Horvath, Kevin Skadron
DATE
2008
IEEE
126views Hardware» more  DATE 2008»
15 years 4 months ago
In-band Cross-Trigger Event Transmission for Transaction-Based Debug
Cross-trigger, the mechanism to trigger activities in one debug entity from debug events happened in another debug entity, is a very useful technique for debugging applications in...
Shan Tang, Qiang Xu
ESORICS
2007
Springer
15 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
WWIC
2004
Springer
123views Communications» more  WWIC 2004»
15 years 3 months ago
Experimental Analysis of Heterogeneous Wireless Networks
Packet loss and delay in Internet degrade the quality of requested services like VoIP (Voice over IP) or Video Streaming. In novel network scenarios where wired and wireless connec...
Giulio Iannello, Antonio Pescapè, Giorgio V...