Sciweavers

436 search results - page 58 / 88
» Automating Performance Analysis from Taverna Workflows
Sort
View
GLOBECOM
2010
IEEE
13 years 6 months ago
Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Exist...
Piergiuseppe Di Marco, Pan Gun Park, Carlo Fischio...
DATE
2005
IEEE
116views Hardware» more  DATE 2005»
14 years 2 months ago
FORAY-GEN: Automatic Generation of Affine Functions for Memory Optimizations
In today’s embedded applications a significant portion of energy is spent in the memory subsystem. Several approaches have been proposed to minimize this energy, including the u...
Ilya Issenin, Nikil D. Dutt
GIS
2009
ACM
14 years 3 months ago
Proximate sensing using georeferenced community contributed photo collections
Volunteered geographic information such as that available in blogs, wikis, social networking sites, and community contributed photo collections is enabling new applications. This ...
Daniel Leung, Shawn Newsam
ESAW
2009
Springer
14 years 3 months ago
Determining the Trustworthiness of New Electronic Contracts
Expressing contractual agreements electronically potentially allows agents to automatically perform functions surrounding contract use: establishment, fulfilment, renegotiation et...
Paul T. Groth, Simon Miles, Sanjay Modgil, Nir Ore...
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson