Sciweavers

605 search results - page 107 / 121
» A strategy for efficiently verifying requirements
Sort
View
TWC
2008
141views more  TWC 2008»
13 years 8 months ago
Progressive Accumulative Routing: Fundamental Concepts and Protocol
This paper considers a multi-hop network in which relay nodes cooperate to minimize the total energy consumed in transmitting a (unicast) packet from a source to a destination. We...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch,...
CASES
2010
ACM
13 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
ENVSOFT
2011
134views more  ENVSOFT 2011»
13 years 3 months ago
Modelling and simulation of a jet fan for controlled air flow in large enclosures
Jet fans are applied for control of air flow and support of pollutant dispersal in large enclosures. In The Netherlands, application is well known for car parks as part of the fir...
B. J. M. v. d. Giesen, S. H. A. Penders, M. G. L. ...
DAC
2005
ACM
14 years 10 months ago
Energy optimal speed control of devices with discrete speed sets
We obtain analytically, the energy optimal speed profile of a generic multi-speed device with a discrete set of speeds, to execute a given task within a given time. Current implem...
Ravishankar Rao, Sarma B. K. Vrudhula
EUROSYS
2010
ACM
14 years 1 months ago
Fingerprinting the Datacenter: Automated Classification of Performance Crises
When a performance crisis occurs in a datacenter, rapid recovery requires quickly recognizing whether a similar incident occurred before, in which case a known remedy may apply, o...
Peter Bodik, Moises Goldszmidt, Armando Fox, Dawn ...