Sciweavers

1682 search results - page 205 / 337
» Techniques for Automating Distributed Real-Time Applications...
Sort
View
WISEC
2010
ACM
14 years 10 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
HPCA
1996
IEEE
15 years 2 months ago
Co-Scheduling Hardware and Software Pipelines
Exploiting instruction-level parallelism (ILP) is extremely important for achieving high performance in application specific instruction set processors (ASIPs) and embedded process...
Ramaswamy Govindarajan, Erik R. Altman, Guang R. G...
GIS
2008
ACM
15 years 11 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
MIDDLEWARE
2004
Springer
15 years 3 months ago
Mobile adaptive tasks guided by resource contracts
This paper proposes a way to realize the idea of calm computing by adding a dynamic task model into the pervasive computing environment. This task model contains information about...
Peter Rigole, Yolande Berbers, Tom Holvoet
NETGAMES
2006
ACM
15 years 3 months ago
On the support for heterogeneity in networked virtual environment
This paper presents our ongoing research activity to design and implement a framework for an networked virtual environment (NVE) that efficiently supports both hardware and softwa...
Hiroshi Fujinoki