Sciweavers

377 search results - page 25 / 76
» Distributed computation under bit constraints
Sort
View
114
Voted
ICPPW
2006
IEEE
15 years 8 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
178
Voted
OPODIS
2010
15 years 20 days ago
On Best-Effort Utility Accrual Real-Time Scheduling on Multiprocessors
We consider the problem of scheduling dependent real-time tasks for overloads on a multiprocessor system, yielding best-effort timing assurance. The application/scheduling model in...
Piyush Garyali, Matthew Dellinger, Binoy Ravindran
163
Voted
MOBIHOC
2005
ACM
16 years 2 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha
132
Voted
CAL
2007
15 years 2 months ago
Logic-Based Distributed Routing for NoCs
—The design of scalable and reliable interconnection networks for multicore chips (NoCs) introduces new design constraints like power consumption, area, and ultra low latencies. ...
José Flich, José Duato
115
Voted
TASLP
2010
98views more  TASLP 2010»
15 years 1 months ago
Trellis-Based Approaches to Rate-Distortion Optimized Audio Encoding
—Many important audio coding applications, such as streaming and playback of stored audio, involve offline compression. In such scenarios, encoding delays no longer represent a ...
Vinay Melkote, Kenneth Rose