Sciweavers

1989 search results - page 356 / 398
» cost 2010
Sort
View
PERCOM
2010
ACM
15 years 3 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 3 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
WCNC
2010
IEEE
15 years 3 months ago
Hedonic Coalition Formation Games for Secondary Base Station Cooperation in Cognitive Radio Networks
— In order to maintain a conflict-free environment among licensed primary users (PUs) and unlicensed secondary users (SUs) in cognitive radio networks, providing frequency and g...
Walid Saad, Zhu Han, Tamer Basar, Are Hjøru...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
15 years 3 months ago
Online discovery and maintenance of time series motifs
The detection of repeated subsequences, time series motifs, is a problem which has been shown to have great utility for several higher-level data mining algorithms, including clas...
Abdullah Mueen, Eamonn J. Keogh
CNSR
2010
IEEE
164views Communications» more  CNSR 2010»
15 years 3 months ago
Buffered Crossbar Fabrics Based on Networks on Chip
— Buffered crossbar (CICQ) switches have shown a high potential in scaling Internet routers capacity. However, they require expensive on-chip buffers whose cost grows quadratical...
Lotfi Mhamdi, Kees Goossens, Iria Varela Senin