Sciweavers

2945 search results - page 548 / 589
» Designing and Implementing Malicious Hardware
Sort
View
DAMON
2008
Springer
15 years 5 months ago
CAM conscious integrated answering of frequent elements and top-k queries over data streams
Frequent elements and top-k queries constitute an important class of queries for data stream analysis applications. Certain applications require answers for both frequent elements...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
OPODIS
2004
15 years 5 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
SIGMETRICS
2008
ACM
117views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Epidemic live streaming: optimal performance trade-offs
Several peer-to-peer systems for live streaming have been recently deployed (e.g. CoolStreaming, PPLive, SopCast). These all rely on distributed, epidemic-style dissemination mech...
Thomas Bonald, Laurent Massoulié, Fabien Ma...
155
Voted
WINET
2002
169views more  WINET 2002»
15 years 3 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
VLSID
2001
IEEE
144views VLSI» more  VLSID 2001»
16 years 4 months ago
Next Generation Network Processors
Networking hardware manufacturers face the dual demands of supporting ever increasing bandwidth requirements, while also delivering new features, such as the ability to implement ...
Deepak Kataria