Sciweavers

39362 search results - page 7793 / 7873
» Global Computing Systems
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
14 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
EMSOFT
2009
Springer
14 years 1 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
ICCCN
2007
IEEE
14 years 1 months ago
Applying Wavelet De-noising to Improve TCP Throughput in AQM queues with Existence of Unresponsive Traffic
Abstract-- in the current Internet, congestion control is performed jointly by the end systems running the TCP protocol and by routers running Active Queue Management (AQM) algorit...
Yi Pan, Wei K. Tsai, Tatsuya Suda
GLOBECOM
2009
IEEE
14 years 1 months ago
Coexistence Problem in IEEE 802.22 Wireless Regional Area Networks
IEEE 802.22 wireless regional area network (WRAN) is an emerging cognitive radio-based system. One of the major challenges for WRANs is how to efficiently schedule both channel sen...
Raed T. Al-Zubi, Mohammad Z. Siam, Marwan Krunz
APPROX
2006
Springer
88views Algorithms» more  APPROX 2006»
14 years 1 months ago
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs
Motivated by applications in batch scheduling of jobs in manufacturing systems and distributed computing, we study two related problems. Given is a set of jobs {J1, . . . , Jn}, w...
Leah Epstein, Magnús M. Halldórsson,...
« Prev « First page 7793 / 7873 Last » Next »