Sciweavers

41938 search results - page 8208 / 8388
» Complex Systems Modeling
Sort
View
CGO
2006
IEEE
15 years 8 months ago
A Cross-Architectural Interface for Code Cache Manipulation
Software code caches help amortize the overhead of dynamic binary transformation by enabling reuse of transformed code. Since code caches contain a potentiallyaltered copy of ever...
Kim M. Hazelwood, Robert S. Cohn
106
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Outage Performance of Cognitive Wireless Relay Networks
— In this paper, we investigate the outage performance of cognitive wireless relay networks where source nodes communicate to their destinations via multiple hops facilitated by ...
Kyounghwan Lee, Aylin Yener
INFOCOM
2006
IEEE
15 years 8 months ago
Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Rep
— This paper investigates theoretical aspects of the uneven energy depletion phenomenon recently noticed in sink-based wireless sensor networks. We consider uniformly distributed...
Stephan Olariu, Ivan Stojmenovic
IPCCC
2006
IEEE
15 years 8 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
P2P
2006
IEEE
153views Communications» more  P2P 2006»
15 years 8 months ago
A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids
Peer-to-peer grids aim to build computational grids encompassing thousands of sites. To achieve this scale, such systems cannot rely on trust or off-line negotiations among partic...
Miranda Mowbray, Francisco Vilar Brasileiro, Nazar...
« Prev « First page 8208 / 8388 Last » Next »