Sciweavers

67 search results - page 9 / 14
» Enhancing Tropos with Commitments
Sort
View
FGCN
2008
IEEE
125views Communications» more  FGCN 2008»
14 years 2 months ago
Coordinating System Software for Power Savings
Power consumption is becoming a primary concern as a result of tremendous increasing in computer power usage. Innumerable methods and techniques have been exploited to address thi...
Lingxiang Xiang, Jiangwei Huang, Tianzhou Chen
WCNC
2008
IEEE
14 years 2 months ago
Intelligent Weather Systems with Fuzzy Logic Controller for Satellite Networks
— Weather attenuations can have a distorting effect on signal fidelity above 10 GHz that lead to excessive digital transmission error. This loss of signal is commonly referred to...
Kamal Harb, Changcheng Huang, Anand Srinivasan, Br...
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
14 years 2 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 2 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
IAT
2006
IEEE
14 years 1 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath