Sciweavers

933 search results - page 159 / 187
» Design and Evaluation of the Home Network Systems Using the ...
Sort
View
ISCA
2009
IEEE
186views Hardware» more  ISCA 2009»
14 years 3 months ago
Application-aware deadlock-free oblivious routing
Conventional oblivious routing algorithms are either not application-aware or assume that each flow has its own private channel to ensure deadlock avoidance. We present a framewo...
Michel A. Kinsy, Myong Hyon Cho, Tina Wen, G. Edwa...
DEBS
2007
ACM
13 years 10 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
CACM
2005
126views more  CACM 2005»
13 years 8 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
PERCOM
2010
ACM
14 years 11 days ago
Orchestrator: An active resource orchestration framework for mobile context monitoring in sensor-rich mobile environments
— In this paper, we present Orchestrator, an active resource orchestration framework for mobile context monitoring. Emerging pervasive environments will introduce a PAN-scale sen...
Seungwoo Kang, Youngki Lee, Chulhong Min, Younghyu...
GLOBECOM
2007
IEEE
14 years 2 months ago
Perceptual Quality in P2P Multi-Source Video Streaming Policies
— This paper explores a key aspect of the problem of sending real-time video over the Internet using a P2P architecture. The main difficulty with such a system is the high dynam...
Héctor Cancela, Pablo Rodríguez-Bocc...