Sciweavers

8874 search results - page 1636 / 1775
» A New Implementation of Automath
Sort
View
LCN
2006
IEEE
15 years 10 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “bestâ€...
Murad Abusubaih, James Gross, Sven Wiethölter...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
15 years 10 months ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efï¬ciently supports high-bandwidth, uniform latency memory accesses, and high-conï¬dence throughput eve...
Banit Agrawal, Timothy Sherwood
SECPERU
2006
IEEE
15 years 10 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
SEW
2006
IEEE
15 years 10 months ago
Goal-Driven Software Development
Established software development processes focus on delivering software within time and budget according to a set of requirements. However, practical experiences show that neither...
Ingo Schnabel, Markus Pizka
SUTC
2006
IEEE
15 years 10 months ago
Detection and Repair of Software Errors in Hierarchical Sensor Networks
Abstract— Sensor networks are being increasingly deployed for collecting critical data in various applications. Once deployed, a sensor network may experience faults at the indiv...
Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Z...
« Prev « First page 1636 / 1775 Last » Next »