Sciweavers

725 search results - page 117 / 145
» Bounding Degrees on RPL
Sort
View
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
14 years 6 months ago
Code Placement with Selective Cache Activity Minimization for Embedded Real-time Software Design
– Many embedded system designs usually impose (hard) read-time constraints on tasks. Thus, computing a tight upper bound of the worst case execution time (WCET) of a software is ...
Junhyung Um, Taewhan Kim
SIES
2009
IEEE
14 years 4 months ago
Real-time enabled IEEE 802.15.4 sensor networks in industrial automation
—Sensor networks have been investigated in many scenarios and a good number of protocols have been developed. With the standardization of the IEEE 802.15.4 protocol, sensor netwo...
Feng Chen, Thomas Talanis, Reinhard German, Falko ...
WG
2009
Springer
14 years 4 months ago
Distance d-Domination Games
Abstract. We study graph searching games where a number of cops try to capture a robber that is hiding in a system of tunnels modelled as a graph. While the current position of the...
Stephan Kreutzer, Sebastian Ordyniak
ISSAC
2009
Springer
139views Mathematics» more  ISSAC 2009»
14 years 4 months ago
Multihomogeneous resultant formulae for systems with scaled support
Constructive methods for matrices of multihomogeneous resultants for unmixed systems have been studied in [7, 14, 16]. We generalize these constructions to mixed systems, whose Ne...
Ioannis Z. Emiris, Angelos Mantzaflaris
AINA
2008
IEEE
14 years 4 months ago
Optimal Resource Discovery Paths of Gnutella2
This paper shows that the performance of peer-to-peer resource discovery algorithms is upper bounded by a k-Steiner minimum tree and proposes an algorithm locating near-optimal qu...
Mikko Vapa, Annemari Auvinen, Yevgeniy Ivanchenko,...