Sciweavers

927 search results - page 164 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
SENSYS
2005
ACM
15 years 10 months ago
Packet combining in sensor networks
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions o...
Henri Dubois-Ferrière, Deborah Estrin, Mart...
EWSN
2007
Springer
16 years 4 months ago
RIDA: A Robust Information-Driven Data Compression Architecture for Irregular Wireless Sensor Networks
Abstract. In this paper, we propose and evaluate RIDA, a novel informationdriven architecture for distributed data compression in a sensor network, allowing it to conserve energy a...
Xuan Thanh Dang, Nirupama Bulusu, Wu-chi Feng
ISCA
2009
IEEE
136views Hardware» more  ISCA 2009»
15 years 11 months ago
ECMon: exposing cache events for monitoring
The advent of multicores has introduced new challenges for programmers to provide increased performance and software reliability. There has been significant interest in technique...
Vijay Nagarajan, Rajiv Gupta
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 8 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
BMCBI
2008
86views more  BMCBI 2008»
15 years 4 months ago
Predicting protein linkages in bacteria: Which method is best depends on task
Background: Applications of computational methods for predicting protein functional linkages are increasing. In recent years, several bacteria-specific methods for predicting link...
Anis Karimpour-Fard, Sonia M. Leach, Ryan T. Gill,...