Sciweavers

1520 search results - page 272 / 304
» Applying adaptation design patterns
Sort
View
ICCAD
2010
IEEE
158views Hardware» more  ICCAD 2010»
13 years 8 months ago
Novel binary linear programming for high performance clock mesh synthesis
Clock mesh is popular in high performance VLSI design because it is more robust against variations than clock tree at a cost of higher power consumption. In this paper, we propose ...
Minsik Cho, David Z. Pan, Ruchir Puri
TDSC
2011
13 years 5 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
12 years 6 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
WONS
2012
IEEE
12 years 6 months ago
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
—The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IPbased applications for low-power wireless networks like sensor net...
Marcel Bosling, Torsten Redmann, Jean Tekam, Elias...
SENSYS
2006
ACM
14 years 4 months ago
Data compression algorithms for energy-constrained devices in delay tolerant networks
Sensor networks are fundamentally constrained by the difficulty and energy expense of delivering information from sensors to sink. Our work has focused on garnering additional si...
Christopher M. Sadler, Margaret Martonosi