Sciweavers

1194 search results - page 154 / 239
» Virtualization of Hardware - Introduction and Survey
Sort
View
BIRTHDAY
2008
Springer
15 years 7 months ago
From Domain to Requirements
This is a discursive paper. That is, it shows some formulas (but only as examples so that the reader may be convinced that there is, perhaps, some substance to our claims), no theo...
Dines Bjørner
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
15 years 5 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
NETWORK
2006
177views more  NETWORK 2006»
15 years 5 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
215
Voted
PERVASIVE
2011
Springer
14 years 8 months ago
Disaggregated End-Use Energy Sensing for the Smart Grid
Most utility installed energy meters are primarily intended to support a utility's billing function. They report only the aggregate energy consumption of a home or business o...
Jon Froehlich, Eric Larson, Sidhant Gupta, Gabe Co...
HPDC
2012
IEEE
13 years 7 months ago
Leveraging renewable energy in data centers: present and future
Interest has been growing in powering data centers (at least partially) with renewable or “green” sources of energy, such as solar or wind. However, it is challenging to use t...
Ricardo Bianchini