Sciweavers

1516 search results - page 187 / 304
» The Increasing Nvalue Constraint
Sort
View
RTCSA
2008
IEEE
15 years 10 months ago
Power-Aware Data Buffer Cache Management in Real-Time Embedded Databases
The demand for real-time data services in embedded systems is increasing. In these new computing platforms, using traditional buffer management schemes, whose goal is to minimize ...
Woochul Kang, Sang Hyuk Son, John A. Stankovic
RTCSA
2008
IEEE
15 years 10 months ago
Reward Maximization for Embedded Systems with Renewable Energies
Renewable energies can enable embedded systems to be functional indefinitely. In particular for small autonomous sensors, energy harvesting techniques have attracted much interes...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
SASO
2008
IEEE
15 years 10 months ago
Cells Are Plausible Targets for High-Level Spatial Languages
—High level languages greatly increase the power of a programmer at the cost of programs that consume more s than those written at a lower level of abstraction. This inefficienc...
Jacob Beal, Jonathan Bachrach
WCNC
2008
IEEE
15 years 10 months ago
A Maximum-Throughput Call Admission Control Policy for CDMA Beamforming Systems
— A throughput-maximization call admission control (CAC) policy is proposed for CDMA beamforming systems in which the QoS requirements in both physical and network layers can be ...
Wei Sheng, Steven D. Blostein
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
15 years 10 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros