Sciweavers

5962 search results - page 1035 / 1193
» Working with Patterns and Code
Sort
View
137
Voted
VTC
2007
IEEE
161views Communications» more  VTC 2007»
15 years 10 months ago
Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed
— Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC,...
Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert ...
115
Voted
ACII
2007
Springer
15 years 10 months ago
Interpolating Expressions in Unit Selection
ended abstract reports on on-going work exploring the addition of a certain degree of control over expressivity in a unit selection context. Rather than merely choosing one unit se...
Marc Schröder
128
Voted
MIDDLEWARE
2007
Springer
15 years 9 months ago
A piggybacking approach to reduce overhead in sensor network gossiping
Many wireless sensor network protocols are employing gossipbased message dissemination, where nodes probabilistically forward messages, to reduce message overhead. We are concerne...
Ercan Ucan, Nathanael Thompson, Indranil Gupta
161
Voted
ACMMSP
2006
ACM
260views Hardware» more  ACMMSP 2006»
15 years 9 months ago
Seven at one stroke: results from a cache-oblivious paradigm for scalable matrix algorithms
A blossoming paradigm for block-recursive matrix algorithms is presented that, at once, attains excellent performance measured by • time, • TLB misses, • L1 misses, • L2 m...
Michael D. Adams, David S. Wise
142
Voted
ASPLOS
2006
ACM
15 years 9 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
« Prev « First page 1035 / 1193 Last » Next »