Sciweavers

18 search results - page 3 / 4
» A comparative study of the realization of rate-based computi...
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 18 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
CASCON
1996
126views Education» more  CASCON 1996»
13 years 8 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
SENSYS
2004
ACM
14 years 24 days ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
NOSSDAV
2009
Springer
14 years 1 months ago
Peer-assisted online storage and distribution: modeling and server strategies
Peer-assisted online storage and distribution systems have recently enjoyed large-scale deployment gaining increased popularity for multimedia content sharing in the Internet. Suc...
Ye Sun, Fangming Liu, Bo Li, Baochun Li
AUTOMOTIVEUI
2009
ACM
14 years 1 days ago
Towards an H-Mode for highly automated vehicles: driving with side sticks
The increasing traffic volume confronts the road user with a challenging task. The high number of traffic deaths might not be reducible with passive safety alone. However systems ...
Martin Kienle, Daniel Damböck, Johann Kelsch,...