Sciweavers

1527 search results - page 263 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
ISPD
1998
ACM
89views Hardware» more  ISPD 1998»
13 years 12 months ago
Filling and slotting: analysis and algorithms
In very deep-submicron VLSI, certain manufacturing steps – notably optical exposure, resist development and etch, chemical vapor deposition and chemical-mechanical polishing (CM...
Andrew B. Kahng, Gabriel Robins, Anish Singh, Huij...
MOBISYS
2003
ACM
14 years 7 months ago
Service-Oriented Network Sockets
3], in that it integrates a service-oriented abstraction with the operating system socket interface and provides adaptive service access at the end-host session layer. However, our...
Umar Saif, Justin Mazzola Paluska
INFOCOM
2009
IEEE
14 years 2 months ago
Effective Delay Control in Online Network Coding
—Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that t...
João Barros, Rui A. Costa, Daniele Munarett...
WCNC
2008
IEEE
14 years 2 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 2 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao