Sciweavers

761 search results - page 106 / 153
» Design and Analysis of a Robust Pipelined Memory System
Sort
View
MBEC
2010
122views Communications» more  MBEC 2010»
13 years 2 months ago
Real-time estimation of cerebrospinal fluid system parameters via oscillating pressure infusion
Abstract Hydrocephalus is related to a disturbed cerebrospinal fluid (CSF) system. For diagnosis, lumbar infusion test are performed to estimate outflow conductance, Cout, and pres...
Kennet Andersson, Ian R. Manchester, Jan Malm, And...
VLDB
2007
ACM
145views Database» more  VLDB 2007»
14 years 7 months ago
Executing Stream Joins on the Cell Processor
Low-latency and high-throughput processing are key requirements of data stream management systems (DSMSs). Hence, multi-core processors that provide high aggregate processing capa...
Bugra Gedik, Philip S. Yu, Rajesh Bordawekar
CAV
1998
Springer
175views Hardware» more  CAV 1998»
13 years 12 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
TMC
2010
130views more  TMC 2010»
13 years 6 months ago
SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes
—This paper presents SYNAPSE++, a system for over the air reprogramming of wireless sensor networks (WSNs). In contrast to previous solutions, which implement plain negative ackn...
Michele Rossi, Nicola Bui, Giovanni Zanca, Luca St...
ICDCS
2007
IEEE
14 years 2 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...