Sciweavers

446 search results - page 56 / 90
» A Study of Dead Data Members in C Applications
Sort
View
MOBISYS
2010
ACM
13 years 11 months ago
Characterizing the transport behaviour of the short message service
We build an efficient and reliable data transport protocol on top of the Short Message Service (SMS). We conduct a series of experiments to characterize SMS behaviour under bursty...
Earl Oliver
PPOPP
2006
ACM
14 years 2 months ago
High-performance IPv6 forwarding algorithm for multi-core and multithreaded network processor
IP forwarding is one of the main bottlenecks in Internet backbone routers, as it requires performing the longest-prefix match at 10Gbps speed or higher. IPv6 forwarding further ex...
Xianghui Hu, Xinan Tang, Bei Hua
WISEC
2010
ACM
13 years 9 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
EMSOFT
2009
Springer
14 years 3 months ago
Handling mixed-criticality in SoC-based real-time embedded systems
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded systems, but it poses significant challenges from a design and verification point of view. In ...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Y...
ESCIENCE
2006
IEEE
14 years 15 days ago
Virtual Lab for fMRI: Bridging the Usability Gap
Grid technology can offer a powerful infrastructure for a broad spectrum of (scientific) application areas, but the uptake of grids by "real" applications has been slow....
Sílvia Delgado Olabarriaga, Piter T. de Boe...