Sciweavers

1474 search results - page 197 / 295
» Exploiting Locality in a TMS
Sort
View
ISSRE
2008
IEEE
14 years 5 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
LCN
2008
IEEE
14 years 5 months ago
Efficient power management for Wireless Sensor Networks: A data-driven approach
—Providing energy-efficient continuous data collection services is of paramount importance to Wireless Sensor Network (WSN) applications. This paper proposes a new power manageme...
MingJian Tang, Jinli Cao, Xiaohua Jia
SASO
2008
IEEE
14 years 5 months ago
The Meaning of Semiochemicals to the Design of Self-Organizing Systems
In biology, many organisms coordinate their interactions in a self-organizing and emergent way solely by means of indirect communication based on chemical substances. These so-cal...
Holger Kasinger, Bernhard Bauer, Jörg Denzing...
CODES
2007
IEEE
14 years 5 months ago
Performance and resource optimization of NoC router architecture for master and slave IP cores
System-on-Chip architectures incorporate several IP cores with well defined master and slave characteristics in terms of on-chip communication. The paper presents a parameterized ...
Glenn Leary, Krishna Mehta, Karam S. Chatha
ICC
2007
IEEE
180views Communications» more  ICC 2007»
14 years 5 months ago
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks
— In contrast to the traditional wireless sensor network (WSN) applications that perform only data collection and aggregation, new generation of information processing applicatio...
Murat Demirbas, Xuming Lu