Sciweavers

7426 search results - page 1385 / 1486
» The LHC Computing Challenge
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
IPSN
2010
Springer
15 years 4 months ago
Distributed estimation of linear acceleration for improved accuracy in wireless inertial motion capture
Motion capture using wireless inertial measurement units (IMUs) has many advantages over other techniques. Achieving accurate tracking with IMUs presents a processing challenge, e...
A. D. Young, M. J. Ling, D. K. Arvind
CODES
2008
IEEE
15 years 4 months ago
Intra- and inter-processor hybrid performance modeling for MPSoC architectures
The heterogeneity of modern MPSoC architectures, coupled with the increasing complexity of the applications mapped onto them has recently led to a lot of interest in hybrid perfor...
Frank E. B. Ophelders, Samarjit Chakraborty, Henk ...
ECBS
2008
IEEE
116views Hardware» more  ECBS 2008»
15 years 4 months ago
CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments
System execution modeling (SEM) tools provide an effective means to evaluate the quality of service (QoS) of enterprise distributed real-time and embedded (DRE) systems. SEM tools...
James H. Hill, Douglas C. Schmidt, Adam A. Porter,...
EDOC
2008
IEEE
15 years 4 months ago
Reliable Discovery and Selection of Composite Services in Mobile Environments
Service providers as we know them nowadays are the always-on “static” web service providers, that aim at Five9 availability (99.999%). Formal, or de-facto, standards, such as ...
Lucia Del Prete, Licia Capra
« Prev « First page 1385 / 1486 Last » Next »