Sciweavers

2947 search results - page 109 / 590
» The timely token protocol
Sort
View
LREC
2008
141views Education» more  LREC 2008»
15 years 6 months ago
New Resources for Document Classification, Analysis and Translation Technologies
The goal of the DARPA MADCAT (Multilingual Automatic Document Classification Analysis and Translation) Program is to automatically convert foreign language text images into Englis...
Stephanie Strassel, Lauren Friedman, Safa Ismael, ...
147
Voted
MICRO
2006
IEEE
107views Hardware» more  MICRO 2006»
15 years 4 months ago
Dataflow Predication
Predication facilitates high-bandwidth fetch and large static scheduling regions, but has typically been too complex to implement comprehensively in out-of-order microarchitecture...
Aaron Smith, Ramadass Nagarajan, Karthikeyan Sanka...
PE
2002
Springer
118views Optimization» more  PE 2002»
15 years 4 months ago
Procedures and tools for analysis of network traffic measurements
We present procedures and tools for the analysis of network traffic measurements. The tools consist of stand-alone 1 modules that implement advanced statistical analysis procedure...
Costas Courcoubetis, Vasilios A. Siris
EWSN
2009
Springer
15 years 11 months ago
DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks
Ensuring that every sensor node has the same code version is challenging in dynamic, unreliable multi-hop sensor networks. When nodes have different code versions, the network may...
Thanh Dang, Nirupama Bulusu, Wu-chi Feng, Seungweo...
IPPS
2009
IEEE
15 years 11 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen