Sciweavers

438 search results - page 76 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
ISLPED
2007
ACM
169views Hardware» more  ISLPED 2007»
13 years 9 months ago
Throughput of multi-core processors under thermal constraints
We analyze the effect of thermal constraints on the performance and power of multi-core processors. We propose system-level power and thermal models, and derive expressions for (a...
Ravishankar Rao, Sarma B. K. Vrudhula, Chaitali Ch...
USENIX
2004
13 years 8 months ago
Early Experience with an Internet Broadcast System Based on Overlay Multicast
In this paper, we report on experience in building and deploying an operational Internet broadcast system based on Overlay Multicast. In over a year, the system has been providing...
Yang-Hua Chu, Aditya Ganjam, T. S. Eugene Ng, Sanj...
AAAI
1994
13 years 8 months ago
Knowledge Refinement in a Reflective Architecture
A knowledge acquisition tool should provide a user with maximum guidance in extending and debugging a knowledge base, by preventing inconsistencies and knowledge gaps that may ari...
Yolanda Gil
AUTOMATICA
2008
134views more  AUTOMATICA 2008»
13 years 7 months ago
Probabilistic reachability and safety for controlled discrete time stochastic hybrid systems
In this work, probabilistic reachability over a finite horizon is investigated for a class of discrete time stochastic hybrid systems with control inputs. A suitable embedding of ...
Alessandro Abate, Maria Prandini, John Lygeros, Sh...
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 7 months ago
Distance Distributions in Finite Uniformly Random Networks: Theory and Applications
In wireless networks, the knowledge of nodal distances is essential for performance analysis and protocol design. When determining distance distributions in random networks, the u...
Sunil Srinivasa, Martin Haenggi