Sciweavers

1640 search results - page 279 / 328
» Transistor-Level Timing Analysis Using Embedded Simulation
Sort
View
JPDC
2007
112views more  JPDC 2007»
15 years 2 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
155
Voted
TMC
2008
129views more  TMC 2008»
15 years 2 months ago
Mobility Modeling and Performance Evaluation of Heterogeneous Wireless Networks
The future-generation wireless systems will combine heterogeneous wireless access technologies to provide mobile users with seamless access to a diverse set of applications and ser...
Ahmed H. Zahran, Ben Liang, Aladdin Saleh
ICCD
2000
IEEE
75views Hardware» more  ICCD 2000»
15 years 11 months ago
Hybridizing and Coalescing Load Value Predictors
Most well-performing load value predictors are hybrids that combine multiple predictors into one. Such hybrids are often large. To reduce their size and to improve their performan...
Martin Burtscher, Benjamin G. Zorn
MABS
2004
Springer
15 years 7 months ago
Change Your Tags Fast! - A Necessary Condition for Cooperation?
Since Holland (1993) introduced the concept of tags as a possible cooperation forming mechanism in evolving system (among other things) a number of tag models with intriguing, and ...
David Hales
CORR
2010
Springer
142views Education» more  CORR 2010»
15 years 2 months ago
The Accuracy of Tree-based Counting in Dynamic Networks
Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...